Abstract | ||
---|---|---|
The traditional random multi-byte fault model in AES fault attack only uses the faulty ciphertexts with diagonal-fault distributions to implement differential fault analysis. When there are not enough exploitable faulty ciphertexts, the round key could not be confirmed directly, and a comparatively large search space is still left for brute-force attack. In this paper, an improved differential fault analysis (DFA) using all-fault ciphertexts on AES was proposed. The all-fault ciphertexts could be used to optimize the selection of the brute-force space, which is helpful to recover the secret key quickly and improves the analysis efficiency. The experiment result demonstrated that by applying the DFA with all-fault ciphertexts, the time consumed on the brute-force attack can be reduced 60.81% on average, which significantly accelerated the process of cracking AES. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/ASICON.2017.8252468 | 2017 IEEE 12th International Conference on ASIC (ASICON) |
Keywords | Field | DocType |
improved differential fault analysis,DFA,all-fault ciphertexts,brute-force attack,traditional random multibyte fault model,AES fault attack,faulty ciphertexts,diagonal-fault distributions,brute-force space,secret key | Computer science,Real-time computing,Encryption,Fault attack,Computer engineering,Fault model,Laser beams,Differential fault analysis | Conference |
Volume | ISSN | ISBN |
2017-October | 2162-7541 | 978-1-5090-6626-1 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ni Yewen | 1 | 6 | 1.88 |
Cui Xiaole | 2 | 21 | 15.35 |
Cui Xiaole | 3 | 21 | 15.35 |
Wang Tian | 4 | 17 | 15.16 |
Fan Yuanning | 5 | 0 | 0.34 |
Han Qiankun | 6 | 0 | 0.34 |
Liu Kefei | 7 | 0 | 0.34 |