Abstract
Differential Power Analysis against AES proved to be effective, with use mask techniques, we can truncate the relevance and defense DPA attacks successfully. In this paper, we introduce a new mean called DFA (Differential Fault Attack), DFA has been shown successfully to attack AES algorithm with masking. We inject a fault to the intermediate results and other general form to obtain the ciphertext with faults, using the ciphertext we can recover the keys. Firstly, we construct the Sbox / InvSbox distribution tables to make the results sets space is less than 28 with two correct/fault ciphertexts pairs, even, in most cases, the set space are strict in 22. Secondly, we also demonstrated that the model of DFA we constructed can ignore the masking techniques and propose some methods to recover the keys with less time consuming and reduced searching space. Lastly, we make the module into an application and prove the module is effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
National Institute of Standards and Technology. Advanced Encryption Standard (AES), FIPS-197 (2001)
Örs, S.B., Gürkaynak, F., Oswald, E., Preneel, B.: Power-Analysis Attack on an ASIC AES Implementation. In: ITCC 2004, pp. 546–566. IEEE Press (April 2004)
Mangard, S., Pramstaller, N., Oswald, E.: Successfully Attacking AES Hardware Implementations. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 157–171. Springer, Heidelberg (2005)
Joye, M., Paillier, P., Schoenmakers, B.: On Second-Order Differential Power Analysis. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 293–308. Springer, Heidelberg (2005)
Prouff, E., Rivain, M., Bevan, R.: Statistical Analysis of Second Order Differential Power Analysis. IEEE Transactions on Computers 58, 799–811 (2009)
Waddle, J., Wagner, D.: Towards Efficient Second-Order Power Analysis. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 1–15. Springer, Heidelberg (2004)
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract). In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on AES. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 293–306. Springer, Heidelberg (2003)
Piret, G., Quisquater, J.-J.: A Differential Fault Attack Technique against SPN Structures, with Application to AES and KHAZAD. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 77–88. Springer, Heidelberg (2003)
Moradi, A., Shalmani, M.T.M., Salmasizadeh, M.: A Generalized Method of Differential Fault Attack against AES Cryptosystem. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 91–100. Springer, Heidelberg (2006)
Kim, C.H., Quisquater, J.-J.: New Differential Fault Analysis on AES Key Schedule: Two faults are enough. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 48–60. Springer, Heidelberg (2008)
Kim, C.H.: Improved Differential Fault Analysis on AES Key Schedule. IEEE Transaction on Information Forensics and Security 7(1) (February 2012)
Takahashi, J., Fukunaga, T.: Differential Fault Analysis on the AES Key Schedule, IACR, eprint archive, pp. 471–480 (2007)
Tunstall, M., Mukhopadhyay, D., Ali, S.: Differential Fault Analysis of the Advanced Encryption Standard Using a Single Fault. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 224–233. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Cai, Z., Wang, Y., Li, R. (2013). An Improved Differential Fault Analysis Attack to AES Using Reduced Searching Space. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_33
Download citation
DOI: https://doi.org/10.1007/978-3-319-03584-0_33
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03583-3
Online ISBN: 978-3-319-03584-0
eBook Packages: Computer ScienceComputer Science (R0)