Efficient Differential Fault Analysis Attacks to AES Decryption for Low Cost Sensors in IoTs

被引:0
|
作者
Zhu, Limin [1 ]
Wang, Yi [2 ]
Li, Renfa [1 ]
机构
[1] Hunan Univ, Key Lab Embedded & Network Comp Hunan Prov, Changsha, Hunan, Peoples R China
[2] ASTAR, Inst Infocomm Res, Singapore, Singapore
来源
2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS) | 2016年
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Robust sensor system plays an important role in Internet of Things (IoTs). These intelligent sensors are required to be low cost and reliable, which provides confidentiality for private sensitive data. However, this protected system is still under the risk of Differential Fault Analysis (DFA) attacks. In this paper, we focus on DFA attacks to AES decryption as decryption receives the equalling importance as encryption. First, we induce a fault at the input of the third round in the procedure of AES decryption, in which we successfully break it using one pair of fault-free and faulty plaintexts within 2(32) searching space. Then, we improve this attack by use of S-Box distribution table, which reduces the computational time from 853 ms to 70 ms on a dual Intel(R) Pentium(R) E6700 core (3.20 GHz). Compared to the existing work, our proposed attack reduces 79.5% computational time when both methods employ two pairs of fault-free and faulty ciphertexts/plaintexts.
引用
收藏
页码:554 / 557
页数:4
相关论文
共 50 条
  • [31] Low-Complexity AES Architectures Resilient to Power Analysis Attacks
    Zhou, Jingbo
    Elgendy, Elsayed
    Tawfik, Eslam Yahya
    Zhang, Xinmiao
    2022 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 22), 2022, : 165 - 169
  • [32] Differential fault analysis attack-tolerant hardware implementation of AES
    Anit Kumar Ghosal
    Amit Sardar
    Dipanwita Roy Chowdhury
    The Journal of Supercomputing, 2024, 80 : 4648 - 4681
  • [33] Differential fault analysis attack-tolerant hardware implementation of AES
    Ghosal, Anit Kumar
    Sardar, Amit
    Chowdhury, Dipanwita Roy
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (04): : 4648 - 4681
  • [34] Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES Implementation
    Barenghi, Alessandro
    Hocquet, Cedric
    Bol, David
    Standaert, Francois-Xavier
    Regazzoni, Francesco
    Koren, Israel
    RFID SECURITY AND PRIVACY, 2012, 7055 : 48 - +
  • [35] Differential Power Analysis and Differential Fault Attack Resistant AES Algorithm and its VLSI Implementation
    Zhao, Jia
    Han, Jun
    Zeng, Xiaoyang
    Li, Liang
    Deng, Yunsong
    2008 9TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED-CIRCUIT TECHNOLOGY, VOLS 1-4, 2008, : 2212 - 2215
  • [36] Practical, Low-Cost Fault Injection Attacks on Personal Smart Devices
    Delarea, Shaked
    Oren, Yossi
    APPLIED SCIENCES-BASEL, 2022, 12 (01):
  • [37] A Solitary Protection Measure against Scan Chain, Fault Injection, and Power Analysis Attacks on AES
    Dhar, Tonmoy
    Bhunia, Swarup
    Trivedi, Amit Ranjan
    2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 575 - 578
  • [38] Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
    Luo, Pei
    Fei, Yunsi
    Zhang, Liwei
    Ding, A. Adam
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [39] New differential fault analysis on AES key schedule: Two faults are enough
    Kim, Chong Hee
    Quisquater, Jean-Jacques
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 48 - 60
  • [40] A new and efficient approach to protect AES against differential power analysis
    Islamshahr Azad University, Islamshahr Branch, Iran
    不详
    World Congr. Internet Secur., WorldCIS, 1600, (59-66):