DocumentCode
2297130
Title
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion
Author
Floissac, Noémie ; L´Hyver, Yann
Author_Institution
SERMA Technol. ITSEF, Pessac, France
fYear
2011
fDate
28-28 Sept. 2011
Firstpage
43
Lastpage
53
Abstract
Since its announcement, AES has been subject to different DFA attacks. Most of these attacks target the AES with 128-bit key. However, the two other variants are nowadays deployed in various applications and are also submitted to the same attack path. In this paper, we adapt DFA techniques originally used on AES-128 in order to retrieve the whole keys of AES-192 and AES-256. The two main kinds of injection localization have been analyzed: faults during cipher and during Key Expansion computations. Analysis of this last case highlights different fault diffusion problems requiring to be solved to exploit the differential faults. Finally, we propose the first attack on AES-192 and AES-256 on Key Expansion. This attack leads finding the whole initial key with 16 fault injections in both cases.
Keywords
cryptography; AES-128; AES-192; AES-256; DFA techniques; differential fault; fault diffusion problems; fault injection localization; key expansion computation; Algorithm design and analysis; Arrays; Cryptography; Doped fiber amplifiers; Equations; Schedules; Vocabulary; AES-192; AES-256; DFA; KeyExpansion; fault injection;
fLanguage
English
Publisher
ieee
Conference_Titel
Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on
Conference_Location
Nara
Print_ISBN
978-1-4577-1463-4
Type
conf
DOI
10.1109/FDTC.2011.15
Filename
6076466
Link To Document