In this paper we describe a differential fault attack technique working against Substitution-Permutation Networks, and requiring very few faulty ciphertexts. The fault model used is realistic, as we consider random faults affecting bytes (faults affecting one only bit are much harder to induce). We implemented our attack on a PC for both the AES and KHAZAD. We are able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES[6,10,11]. Under similar hypothesis, KHAZAD is breakable with 3 faulty ciphertexts
Since its first introduction, differential fault analysis has proved to be one of the most effective...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
In this paper we describe two differential fault attack techniques against Advanced Encryption Stand...
Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel...
© 2014 John Wiley & Sons, Ltd. Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryp...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
We propose a differential attack on tree-structured substitution-permutation networks. The number of...
Part 7: Security Attacks and Measures (Short Papers)International audienceIn this paper we present a...
Most of the attacks against the Advanced Encryption Standard based on faults mainly aim at either al...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
In this paper we describe two differential fault attack techniques against Advanced Encryption Stand...
Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel...
© 2014 John Wiley & Sons, Ltd. Meet-in-the-Middle (MitM) fault analysis is a kind of powerful cryp...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
We propose a differential attack on tree-structured substitution-permutation networks. The number of...
Part 7: Security Attacks and Measures (Short Papers)International audienceIn this paper we present a...
Most of the attacks against the Advanced Encryption Standard based on faults mainly aim at either al...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...
International audienceLS-Designs are a family of SPN-based block ciphers whose linear layer is based...
Since its first introduction, differential fault analysis has proved to be one of the most effective...