ISBN : 978-0-7695-5059-6International audienceIn this paper we investigate the problem of reverse engineering the specifications of a secret AES-like block cipher defined by a set of non-standard parameters. We allow the designer to modify all parameters of an AES (S-Box table, SR constants, MC coefficients as well as the RW and the RC values) provided that the SPN structure and sizes are preserved. We propose a chosen plaintext FIRE attack based on ineffective fault analysis (IFA) in the "byte stuck at 0" fault model. We describe a step-by-step procedure that recovers the AES-like secret parameters without requiring the knowledge of the encryption key. The soundness and the efficiency of each step is evaluated by simulations. As our attack...
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
In 2014, a new fault analysis called blind fault attack (BFA) was proposed, in which attackers can o...
ISBN : 978-0-7695-5059-6International audienceIn this paper we investigate the problem of reverse en...
International audienceDespite Kerckhoffs’s principle, proprietary or otherwise secret cryptographic ...
International audienceDespite Kerckhoffs's principle, proprietary or otherwise secret cryptographic ...
Part 8: Security AttacksInternational audienceIn this paper, we propose a new technique that uses fa...
Public knowledge about the structure of a cryptographic system is a standard assumption in the liter...
International audienceThis paper presents a fault injection attack in order to reverse engineer unkn...
A high-efficient fault attack on AES S-box is proposed in this paper. Faults are introduced in the e...
A high-efficient fault attack on AES S-box is proposed in this paper. Faults are introduced in the e...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
International audienceSecurity is a key component for information technologies and communication and...
Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel...
Abstract—Previous works have shown that the combinatorial path delay of a cryptographic function, e....
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
In 2014, a new fault analysis called blind fault attack (BFA) was proposed, in which attackers can o...
ISBN : 978-0-7695-5059-6International audienceIn this paper we investigate the problem of reverse en...
International audienceDespite Kerckhoffs’s principle, proprietary or otherwise secret cryptographic ...
International audienceDespite Kerckhoffs's principle, proprietary or otherwise secret cryptographic ...
Part 8: Security AttacksInternational audienceIn this paper, we propose a new technique that uses fa...
Public knowledge about the structure of a cryptographic system is a standard assumption in the liter...
International audienceThis paper presents a fault injection attack in order to reverse engineer unkn...
A high-efficient fault attack on AES S-box is proposed in this paper. Faults are introduced in the e...
A high-efficient fault attack on AES S-box is proposed in this paper. Faults are introduced in the e...
Abstract. In this paper we describe a differential fault attack technique working against Substituti...
International audienceSecurity is a key component for information technologies and communication and...
Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel...
Abstract—Previous works have shown that the combinatorial path delay of a cryptographic function, e....
International audienceSince the early work of Piret and Quisquater on fault attacks against AES at C...
In this paper we describe a differential fault attack technique working against Substitution-Permuta...
In 2014, a new fault analysis called blind fault attack (BFA) was proposed, in which attackers can o...