Title
Improving DFA on AES using all-fault ciphertexts
Abstract
The traditional random multi-byte fault model in AES fault attack only uses the faulty ciphertexts with diagonal-fault distributions to implement differential fault analysis. When there are not enough exploitable faulty ciphertexts, the round key could not be confirmed directly, and a comparatively large search space is still left for brute-force attack. In this paper, an improved differential fault analysis (DFA) using all-fault ciphertexts on AES was proposed. The all-fault ciphertexts could be used to optimize the selection of the brute-force space, which is helpful to recover the secret key quickly and improves the analysis efficiency. The experiment result demonstrated that by applying the DFA with all-fault ciphertexts, the time consumed on the brute-force attack can be reduced 60.81% on average, which significantly accelerated the process of cracking AES.
Year
DOI
Venue
2017
10.1109/ASICON.2017.8252468
2017 IEEE 12th International Conference on ASIC (ASICON)
Keywords
Field
DocType
improved differential fault analysis,DFA,all-fault ciphertexts,brute-force attack,traditional random multibyte fault model,AES fault attack,faulty ciphertexts,diagonal-fault distributions,brute-force space,secret key
Computer science,Real-time computing,Encryption,Fault attack,Computer engineering,Fault model,Laser beams,Differential fault analysis
Conference
Volume
ISSN
ISBN
2017-October
2162-7541
978-1-5090-6626-1
Citations 
PageRank 
References 
0
0.34
0
Authors
7
Name
Order
Citations
PageRank
Ni Yewen161.88
Cui Xiaole22115.35
Cui Xiaole32115.35
Wang Tian41715.16
Fan Yuanning500.34
Han Qiankun600.34
Liu Kefei700.34