메뉴 건너뛰기




Volumn , Issue , 2011, Pages 35-42

A differential fault analysis on AES key schedule using single fault

Author keywords

AES; AES key schedule; Differential Fault Analysis; Fault Model

Indexed keywords

AES; AES KEY SCHEDULE; CIPHERTEXTS; DIFFERENTIAL FAULT ANALYSIS; FAULT ANALYSIS; FAULT MODEL; INTERMEDIATE STATE; SECRET KEY; SINGLE FAULT;

EID: 83455166352     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FDTC.2011.10     Document Type: Conference Paper
Times cited : (39)

References (24)
  • 1
    • 0003130498 scopus 로고    scopus 로고
    • On the Importance of Checking Cryptographic Protocols for Faults
    • Extended Abstract
    • D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)," in EUROCRYPT, 1997, pp. 37-51.
    • (1997) EUROCRYPT , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 2
    • 84958641478 scopus 로고    scopus 로고
    • Differential Fault Analysis of Secret Key Cryptosystems
    • Advances in Cryptology - CRYPTO '97
    • E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," in CRYPTO, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed., vol. 1294. Springer, 1997, pp. 513-525. (Pubitemid 127112576)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1294 , pp. 513-525
    • Biham, E.1    Shamir, A.2
  • 3
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, NIST FIPS PUB 197
    • " National Institute of Standards and Technology, Advanced Encryption Standard, NIST FIPS PUB 197, 2001."
    • (2001) Advanced Encryption Standard
  • 4
    • 35248884880 scopus 로고    scopus 로고
    • Fault based cryptanalysis of the advanced encryption standard (aes)
    • Financial Cryptography, ser. R. N. Wright, Ed., Springer
    • J. Blömer and J.-P. Seifert, "Fault based cryptanalysis of the advanced encryption standard (aes)," in Financial Cryptography, ser. Lecture Notes in Computer Science, R. N. Wright, Ed., vol. 2742. Springer, 2003, pp. 162-181.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 162-181
    • Blömer, J.1    Seifert, J.-P.2
  • 5
    • 47949105223 scopus 로고    scopus 로고
    • Differential Fault Analysis on A.E.S
    • ePrint Archive, Report 2003/010
    • P. Dusart, G. Letourneux, and O. Vivolo, "Differential Fault Analysis on A.E.S." Cryptology ePrint Archive, Report 2003/010, 2003, http://eprint.iacr.org/.
    • (2003) Cryptology
    • Dusart, P.1    Letourneux, G.2    Vivolo, O.3
  • 6
    • 35248837397 scopus 로고    scopus 로고
    • A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD
    • CHES, ser. C. D. Walter, Çetin Kaya Koç, and C. Paar, Eds., Springer
    • G. Piret and J.-J. Quisquater, "A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD," in CHES, ser. Lecture Notes in Computer Science, C. D. Walter, Çetin Kaya Koç, and C. Paar, Eds., vol. 2779. Springer, 2003, pp. 77-88.
    • (2003) Lecture Notes in Computer Science , vol.2779 , pp. 77-88
    • Piret, G.1    Quisquater, J.-J.2
  • 7
    • 33750721642 scopus 로고    scopus 로고
    • A Generalized Method of Differential Fault Attack Against AES Cryptosystem
    • A. Moradi, M. T. M. Shalmani, and M. Salmasizadeh, "A Generalized Method of Differential Fault Attack Against AES Cryptosystem," in CHES, 2006, pp. 91-100.
    • (2006) CHES , pp. 91-100
    • Moradi, A.1    Shalmani, M.T.M.2    Salmasizadeh, M.3
  • 8
    • 71049156290 scopus 로고    scopus 로고
    • An Improved Fault Based Attack of the Advanced Encryption Standard
    • AFRICACRYPT, ser. B. Preneel, Ed., Springer
    • D. Mukhopadhyay, "An Improved Fault Based Attack of the Advanced Encryption Standard," in AFRICACRYPT, ser. Lecture Notes in Computer Science, B. Preneel, Ed., vol. 5580. Springer, 2009, pp. 421-434.
    • (2009) Lecture Notes in Computer Science , vol.5580 , pp. 421-434
    • Mukhopadhyay, D.1
  • 9
    • 79960102475 scopus 로고    scopus 로고
    • Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
    • ePrint Archive, Report 2009/575
    • M. Tunstall and D. Mukhopadhyay, "Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault," Cryptology ePrint Archive, Report 2009/575, 2009, http://eprint.iacr.org/.
    • (2009) Cryptology
    • Tunstall, M.1    Mukhopadhyay, D.2
  • 10
    • 24144434064 scopus 로고    scopus 로고
    • DFA on AES
    • AES Conference, ser. H. Dobbertin, V. Rijmen, and A. Sowa, Eds., Springer
    • Christophe Giraud, "DFA on AES," in AES Conference, ser. Lecture Notes in Computer Science, H. Dobbertin, V. Rijmen, and A. Sowa, Eds., vol. 3373. Springer, 2004, pp. 27-41.
    • (2004) Lecture Notes in Computer Science , vol.3373 , pp. 27-41
    • Giraud, C.1
  • 11
    • 63449097489 scopus 로고    scopus 로고
    • Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures
    • C.-N. Chen and S.-M. Yen, "Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures," in ACISP, 2003, pp. 118-129.
    • (2003) ACISP , pp. 118-129
    • Chen, C.-N.1    Yen, S.-M.2
  • 12
    • 47949093297 scopus 로고    scopus 로고
    • DFA Mechanism on the AES Key Schedule
    • L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds. IEEE Computer Society
    • J. Takahashi, T. Fukunaga, and K. Yamakoshi, "DFA Mechanism on the AES Key Schedule," in FDTC, L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds. IEEE Computer Society, 2007, pp. 62-74.
    • (2007) FDTC , pp. 62-74
    • Takahashi, J.1    Fukunaga, T.2    Yamakoshi, K.3
  • 13
    • 52949128011 scopus 로고    scopus 로고
    • New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough
    • C. H. Kim and J.-J. Quisquater, "New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough,"in CARDIS, 2008, pp. 48-60.
    • (2008) CARDIS , pp. 48-60
    • Kim, C.H.1    Quisquater, J.-J.2
  • 14
    • 84855200310 scopus 로고    scopus 로고
    • From aes-128 to aes-192 and aes-256, how to adapt differential fault analysis attacks
    • ePrint Archive, Report 2010/396
    • N. Floissac and Y. L'Hyver, "From aes-128 to aes-192 and aes-256, how to adapt differential fault analysis attacks,"Cryptology ePrint Archive, Report 2010/396, 2010, http: //eprint.iacr.org/.
    • (2010) Cryptology
    • Floissac, N.1    L'Hyver, Y.2
  • 15
    • 51549109326 scopus 로고    scopus 로고
    • Practical Setup Time Violation Attacks on AES
    • N. Selmane, S. Guilley, and J.-L. Danger, "Practical Setup Time Violation Attacks on AES," in EDCC, 2008, pp. 91-96.
    • (2008) EDCC , pp. 91-96
    • Selmane, N.1    Guilley, S.2    Danger, J.-L.3
  • 16
    • 77951007823 scopus 로고    scopus 로고
    • Low Voltage Fault Attacks on the RSA Cryptosystem
    • L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds. IEEE Computer Society
    • A. Barenghi, G. Bertoni, E. Parrinello, and G. Pelosi, "Low Voltage Fault Attacks on the RSA Cryptosystem," in FDTC, L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds. IEEE Computer Society, 2009, pp. 23-31.
    • (2009) FDTC , pp. 23-31
    • Barenghi, A.1    Bertoni, G.2    Parrinello, E.3    Pelosi, G.4
  • 17
    • 77951011385 scopus 로고    scopus 로고
    • Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers
    • L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds. IEEE Computer Society
    • T. Fukunaga and J. Takahashi, "Practical Fault Attack on a Cryptographic LSI with ISO/IEC 18033-3 Block Ciphers," in FDTC, L. Breveglieri, S. Gueron, I. Koren, D. Naccache, and J.-P. Seifert, Eds. IEEE Computer Society, 2009, pp. 84-92.
    • (2009) FDTC , pp. 84-92
    • Fukunaga, T.1    Takahashi, J.2
  • 18
    • 83455198735 scopus 로고    scopus 로고
    • Differential Fault Analysis of AES using a Single Multiple-Byte Fault
    • ePrint Archive, Report 2010/636
    • S. Ali, D. Mukhopadhyay, and M. Tunstall, "Differential Fault Analysis of AES using a Single Multiple-Byte Fault,"Cryptology ePrint Archive, Report 2010/636, 2010, http://eprint.iacr.org/.
    • (2010) Cryptology
    • Ali, S.1    Mukhopadhyay, D.2    Tunstall, M.3
  • 19
    • 84962968104 scopus 로고
    • Differentially uniform mappings for cryptography
    • K. Nyberg, "Differentially uniform mappings for cryptography, "in EUROCRYPT, 1993, pp. 55-64.
    • (1993) EUROCRYPT , pp. 55-64
    • Nyberg, K.1
  • 20
    • 35248813476 scopus 로고    scopus 로고
    • Optical Fault Induction Attacks
    • CHES, ser. B. S. K. Jr., Çetin Kaya Koç, and C. Paar, Eds. Springer
    • S. P. Skorobogatov and R. J. Anderson, "Optical Fault Induction Attacks," in CHES, ser. Lecture Notes in Computer Science, B. S. K. Jr., Çetin Kaya Koç, and C. Paar, Eds., vol. 2523. Springer, 2002, pp. 2-12.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 2-12
    • Skorobogatov, S.P.1    Anderson, R.J.2
  • 21
    • 79960096306 scopus 로고    scopus 로고
    • Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault
    • ePrint Archive, Report 2010/451
    • S. Ali and D. Mukhopadhyay, "Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault," Cryptology ePrint Archive, Report 2010/451, 2010, http://eprint.iacr.org/.
    • (2010) Cryptology
    • Ali, S.1    Mukhopadhyay, D.2
  • 22
    • 83455177241 scopus 로고    scopus 로고
    • A DFA attack against the AES key schedule
    • 26 October
    • D. Peacham and B. Thomas, " A DFA attack against the AES key schedule," SiVenture White Paper 001, 26 October, 2006.
    • (2006) SiVenture White Paper 001
    • Peacham, D.1    Thomas, B.2
  • 23
    • 78049325357 scopus 로고    scopus 로고
    • An Information Theoretic Perspective on the Differential Fault Analysis against AES
    • ePrint Archive, Report 2010/032
    • Y. Li, S. Gomisawa, K. Sakiyama, and K. Ohta, "An Information Theoretic Perspective on the Differential Fault Analysis against AES," Cryptology ePrint Archive, Report 2010/032, 2010, http://eprint.iacr.org/.
    • (2010) Cryptology
    • Li, Y.1    Gomisawa, S.2    Sakiyama, K.3    Ohta, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.