Piret, G.
Quisquater, Jean-Jacques
[UCL]
In this paper we describe a differential fault attack technique working against Substitution-Permutation Networks, and requiring very few faulty ciphertexts. The fault model used is realistic, as we consider random faults affecting bytes (faults affecting one only bit are much harder to induce). We implemented our attack on a PC for both the AES and KHAZAD. We are able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES[6,10,11]. Under similar hypothesis, KHAZAD is breakable with 3 faulty ciphertexts.
Référence bibliographique |
Piret, G. ; Quisquater, Jean-Jacques. A differential fault attack technique against SPN structures, with application to the AES and KHAZAD.5th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003) (COLOGNE(Germany), Sep 08-10, 2003). In: Lecture Notes in Computer Science, Vol. 2779, p. 77-88 (2003) |
Permalien |
http://hdl.handle.net/2078.1/61466 |