EFFICIENT METHOD FOR RANDOM FAULT ATTACK AGAINST AES HARDWARE IMPLEMENTATION

被引:0
|
作者
Liao, Nan [1 ]
Cui, Xiaoxin [1 ]
Wang, Tian [1 ]
Liao, Kai [1 ]
Yu, Dunshan [1 ]
Cui, Xiaole [2 ]
机构
[1] Peking Univ, Inst Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Shenzhen Grad Sch, Key Lab Integrated Microsyst, Beijing 100871, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Random fault attacks against Advanced Encryption Standard (AES) hardware implementation are widely researched. In the previous fault analysis, 6 rounds of attacks arc required to recover the correct round-key, which is not efficient enough for extensive analysis. In this paper. a more efficient fault model is proposed. Based on the analysis of theoretical key candidate number, the proposed attack method can complete the analysis as few as 3 rounds. Experiment results shows that nearly 90% of the attacks recover the correct round-key with 3 rounds and in average only 3.125 rounds are required with our proposed attack method.
引用
收藏
页数:3
相关论文
共 50 条
  • [41] An Efficient AES Implementation against Timing Attacks Based on SoC
    Wang, Rui-jiao
    Zhang, Lu-guo
    Zheng, Bin
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 357 - 360
  • [42] A CPA Attack against Cryptographic Hardware Implementation on SASEBO-GII
    Mestiri, Hassen
    Kahri, Fatma
    Bouallegue, Belgacem
    Machhout, Mohsen
    2017 INTERNATIONAL CONFERENCE ON GREEN ENERGY & CONVERSION SYSTEMS (GECS), 2017,
  • [43] Practical fault resilient hardware implementations of AES
    Sheikhpour, Saeide
    Mahani, Ali
    Bagheri, Nasour
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (05) : 596 - 606
  • [44] Fault attack hardware Trojan detection method based on ring oscillator
    Bi, Qiangjia
    Wu, Ning
    Zhou, Fang
    Zhang, Jinbao
    Yahya, Muhammad Rehan
    Ge, Fen
    IEICE ELECTRONICS EXPRESS, 2019, 16 (08)
  • [45] Efficient Hardware Architectures for AES on FPGA
    Iyer, Nalini
    Anandmohan, P. V.
    Poornaiah, D. V.
    Kulkarni, V. D.
    COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 249 - 257
  • [46] A Novel Tampering Attack on AES Cores with Hardware Trojans
    Jain, Ayush
    Guin, Ujjwal
    2020 IEEE INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA 2020), 2020, : 77 - 82
  • [47] A fault based attack on MDS-AES
    Das, Satyajit
    Bhaumik, Jaydeb
    International Journal of Network Security, 2014, 16 (03) : 193 - 198
  • [48] An efficient differential fault attack against SIMON key schedule
    Zhang, Jinbao
    Wang, Jiehua
    Bin, Ge
    Li, Jianhua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [49] A full matrix joint optimization method for hardware implementation of AES MixColumns/InvMixColumns
    Zhang, Xiaoqiang
    Yang, Fan
    Zheng, Xinxing
    Zhang, Xinggan
    Wu, Ning
    IEICE ELECTRONICS EXPRESS, 2020, 17 (24):
  • [50] Energy-Efficient Hardware Implementation of LUKS PBKDF2 with AES on FPGA
    Li, Xiaochao
    Cao, Chunhui
    Li, Pengtao
    Shen, Shuli
    Chen, Yihui
    Li, Lin
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 402 - 409