Combined Fault and Side-Channel Attack on Protected Implementations of AES
نویسندگان
چکیده
The contribution of this paper is twofold: (1) a novel fault injection attack against AES, based on a new fault model, is proposed. Compared to state-of-the-art attacks, this fault model advantage is to relax constraints on the fault location, and then reduce the a priori knowledge on the implementation. Moreover, the attack algorithm is very simple and leaves room for optimization with respect to specific cases; (2) the fault attack is combined with side-channel analysis in order to defeat fault injection resistant and masked AES implementations. More precisely, our fault injection attack works well even when the attacker has only access to the faulty ciphertexts through a side-channel. Furthermore, the attacks presented in this paper can be extended to any SP-Network.
منابع مشابه
Combined Attacks on the AES Key Schedule
We present new combined attacks on the AES key schedule based on the work of Roche et al. [16]. The main drawbacks of the original attack are: the need for high repeatability of the fault, a very particular fault model and a very high complexity of the key recovery algorithm. We consider more practical fault models, we obtain improved key recovery algorithms and we present more attack paths for...
متن کاملA Specialized Assault Adjacent to the Aes and Its Function to System Implementations
Algebraic side channel attack is a major technique to solve the ciphers and the various side channel attacks. A side channel attack is a type of attack based on information gathered from the application of a cryptosystem, relatively than brute force. Common classes of side channel attack comprise, Timing attack ,Power monitoring attack ,Acoustic cryptanalysis ,Differential fault analysis ,Data ...
متن کاملOn the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting
At CHES 2010 two powerful new attacks were presented, namely the Fault Sensitivity Analysis and the Correlation Collision Attack. This paper shows how these ideas can be combined to create even stronger attacks. Two solutions are presented; both extract leakage information by the fault sensitivity analysis method while each one applies a slightly different collision attack to deduce the secret ...
متن کاملCollision Timing Attack when Breaking 42 AES ASIC Cores
A collision timing attack which exploits the data-dependent timing characteristics of combinational circuits is demonstrated. The attack is based on the correlation collision attack presented at CHES 2010, and the timing attributes of combinational circuits when implementing complex functions, e.g., S-boxes, in hardware are exploited by the help of the scheme used in another CHES 2010 paper nam...
متن کاملOn-Line Self-Test of AES Hardware Implementations
In this paper we propose an on-line self-test architecture for hardware implementations of Advanced Encryption Standard (AES). The solution assumes a parallel architecture and exploits the inherent spatial replications of this implementation. Because Substitution boxes (S-Box) represent the largest hardware in this architecture, we focus on faults affecting these S-Boxes and propose a trade-off...
متن کامل