• DocumentCode
    2297130
  • Title

    From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion

  • Author

    Floissac, Noémie ; L´Hyver, Yann

  • Author_Institution
    SERMA Technol. ITSEF, Pessac, France
  • fYear
    2011
  • fDate
    28-28 Sept. 2011
  • Firstpage
    43
  • Lastpage
    53
  • Abstract
    Since its announcement, AES has been subject to different DFA attacks. Most of these attacks target the AES with 128-bit key. However, the two other variants are nowadays deployed in various applications and are also submitted to the same attack path. In this paper, we adapt DFA techniques originally used on AES-128 in order to retrieve the whole keys of AES-192 and AES-256. The two main kinds of injection localization have been analyzed: faults during cipher and during Key Expansion computations. Analysis of this last case highlights different fault diffusion problems requiring to be solved to exploit the differential faults. Finally, we propose the first attack on AES-192 and AES-256 on Key Expansion. This attack leads finding the whole initial key with 16 fault injections in both cases.
  • Keywords
    cryptography; AES-128; AES-192; AES-256; DFA techniques; differential fault; fault diffusion problems; fault injection localization; key expansion computation; Algorithm design and analysis; Arrays; Cryptography; Doped fiber amplifiers; Equations; Schedules; Vocabulary; AES-192; AES-256; DFA; KeyExpansion; fault injection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Fault Diagnosis and Tolerance in Cryptography (FDTC), 2011 Workshop on
  • Conference_Location
    Nara
  • Print_ISBN
    978-1-4577-1463-4
  • Type

    conf

  • DOI
    10.1109/FDTC.2011.15
  • Filename
    6076466