DocumentCode :
1997134
Title :
Practical Setup Time Violation Attacks on AES
Author :
Selmane, Nidhal ; Guilley, Sylvain ; Danger, Jean-Luc
Author_Institution :
Dept. COMELEC, Telecom ParisTech., Paris
fYear :
2008
fDate :
7-9 May 2008
Firstpage :
91
Lastpage :
96
Abstract :
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES and DES. Various methods of faults attack on cryptographic systems have been discovered and researched. However, to the authors´ knowledge, all the attacks published so far use a theoretical model of faults. In this paper we prove that we are able to reproduce experimentally the random errors model used by G. Piret and J.J. Quisquater (2003) to realize practical fault attack on a smart card embedding an AES encryptor by under-powering it. In spite of the fact that this method is a convenient fault injection technique to set up, it does not often appear in the open literature. We argue that the fault model is consistent with a setup violation: errors appear at the end of combinatorial logic cones, caused by an early sampling in the downwards registers. We also carry out an extensive characterization of the faults, in terms of spatial and temporal localization.
Keywords :
combinatorial mathematics; cryptography; fault diagnosis; AES encryptor; DES; combinatorial logic; cryptographic systems; fault injection technique; faults attacks; robust cryptographic algorithms; setup time violation attacks; smart card; Cryptography; Doped fiber amplifiers; Electromagnetic analysis; Information security; Logic; Power system modeling; Power system security; Robustness; Sampling methods; Smart cards; AES; DFA; Smartcards; side channel attack;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Computing Conference, 2008. EDCC 2008. Seventh European
Conference_Location :
Kaunas
Print_ISBN :
978-0-7695-3138-0
Type :
conf
DOI :
10.1109/EDCC-7.2008.11
Filename :
4555994
Link To Document :
بازگشت