Practical DFA Strategy for AES Under Limited-access Conditions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DFA on AES

In this paper we describe two different DFA attacks on the AES. The first one uses a theoretical fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For an AES-128, this second attack...

متن کامل

Piret and Quisquater's DFA on AES Revisited

At CHES 2003, Piret and Quisquater published a very efficient DFA on AES which has served as a basis for many variants published afterwards. In this paper, we revisit P&Q’s DFA on AES and we explain how this attack can be much more efficient than originally claimed. In particular, we show that only 2 (resp. 3) faulty ciphertexts allow an attacker to efficiently recover the key in the case of AE...

متن کامل

Fast brief practical DFA minimization

Article history: Received 27 May 2011 Received in revised form 2 December 2011 Accepted 5 December 2011 Available online 7 December 2011 Communicated by J. Torán

متن کامل

Acid-mediated reactions under microfluidic conditions: A new strategy for practical synthesis of biofunctional natural products

Microfluidic conditions were applied to acid-mediated reactions, namely, glycosylation, reductive opening of the benzylidene acetal groups, and dehydration, which are the keys to the practical synthesis of N-glycans and the immunostimulating natural product, pristane. A distinctly different reactivity from that in conventional batch stirring was found; the vigorous micromixing of the reactants ...

متن کامل

Practical Verification Strategy for Refinement Conditions in UML Models

This paper presents an automatic and simple method for creating refinement condition for UML models. Conditions are fully written in OCL, making it unnecessary the application of mathematical languages which are in general hardly accepted to software engineers. Besides, considering that the state space where OCL conditions are evaluated might be too large (or even infinite), the strategy of mic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Processing

سال: 2014

ISSN: 1882-6652

DOI: 10.2197/ipsjjip.22.142