EFFICIENT METHOD FOR RANDOM FAULT ATTACK AGAINST AES HARDWARE IMPLEMENTATION

被引:0
|
作者
Liao, Nan [1 ]
Cui, Xiaoxin [1 ]
Wang, Tian [1 ]
Liao, Kai [1 ]
Yu, Dunshan [1 ]
Cui, Xiaole [2 ]
机构
[1] Peking Univ, Inst Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Shenzhen Grad Sch, Key Lab Integrated Microsyst, Beijing 100871, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Random fault attacks against Advanced Encryption Standard (AES) hardware implementation are widely researched. In the previous fault analysis, 6 rounds of attacks arc required to recover the correct round-key, which is not efficient enough for extensive analysis. In this paper. a more efficient fault model is proposed. Based on the analysis of theoretical key candidate number, the proposed attack method can complete the analysis as few as 3 rounds. Experiment results shows that nearly 90% of the attacks recover the correct round-key with 3 rounds and in average only 3.125 rounds are required with our proposed attack method.
引用
收藏
页数:3
相关论文
共 50 条
  • [21] Deep learning side-channel attack against hardware implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 87
  • [22] Deep Learning Side-Channel Attack against Hardware Implementations of AES
    Kubota, Takaya
    Yoshida, Kota
    Shiozaki, Mitsuru
    Fujino, Takeshi
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 261 - 268
  • [23] A Provably Secure Scheme to Prevent Master Key Recovery by Fault Attack on AES Hardware
    Swaroopa, Sneha
    Manivannan, Sivappriya
    Chakraborty, Rajat Subhra
    Chakrabarti, Indrajit
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (04) : 521 - 524
  • [24] AES embedded hardware implementation
    Mourad, Ould-Cheikh
    Lotfy, Si-Mohamed
    Noureddine, Mehallegue
    Ahmed, Bouridane
    Camel, Tanougast
    NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS, PROCEEDINGS, 2007, : 103 - +
  • [25] Fault Analysis Attack against an AES Prototype Chip Using RSL
    Sakiyama, Kazuo
    Yagi, Tatsuya
    Ohta, Kazuo
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 429 - 443
  • [26] A High-Efficient Fault Attack on AES S-box
    Liao, Nan
    Cui, Xiaoxin
    Wang, Tian
    Liao, Kai
    Yu, Dunshan
    Cui, Xiaole
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 210 - 215
  • [27] On a High-performance and Balanced Method of Hardware Implementation for AES
    Zhang, Xiaotao
    Li, Hui
    Yang, Shouwen
    Han, Shuangshuang
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 16 - 20
  • [28] An open-source, efficient and parameterizable hardware implementation of the AES algorithm
    Nacci, A. A.
    Rana, V.
    Sciuto, D.
    Santambrogio, M. D.
    2014 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA), 2014, : 85 - 92
  • [29] Efficient Hardware Implementation of Image Watermarking Using DWT and AES Algorithm
    Singh, Gulroz
    Lamba, Mankirat Singh
    PROCEEDINGS OF THE 2015 39TH NATIONAL SYSTEMS CONFERENCE (NSC), 2015,
  • [30] A MORE PRACTICAL CPA ATTACK AGAINST PRESENT HARDWARE IMPLEMENTATION
    Wang, Chenxu
    Yu, Mingyan
    Wang, Jinxiang
    Jiang, Peihe
    Tang, Xiaochen
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 1248 - 1253