A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output

نویسندگان

  • Jeong-Soo Park
  • KiSeok Bae
  • YongJe Choi
  • Dooho Choi
  • JaeCheol Ha
چکیده

The goal of a fault injection attack is to extract a secret key which is embedded in a cryptographic device by injecting a fault during execution of the algorithm. In particular, an attacker can extract the master key of the advanced encryption standard (AES) using only a one-byte fault injection. We propose a new countermeasure method resistant to fault injection attacks by checking the differential byte of the input and output in the encryption process and key expansion process, respectively. Based on the result of computer simulations and practical experiments, we suggest that our proposed AES implementation against fault attack has a superior error detection ability and improved efficiency compared with previous existing methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)

In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical fault induction attacks as recently publicly presented by Skorobogatov and Anderson [SA], we present an implementation independent fault attack on AES. This attack is able to determine the complete 128-bit secret key of a sealed tamper-proof smartcard by generating 128 faulty cipher t...

متن کامل

transformer differential protection using the fault-generated high-frequency transient components

Power transformers are the most important components of a power system, so their protection is a critical issue. This paper proposes a novel and efficient algorithm based on the high-frequency components of the differential current signal to discriminate between the magnetizing inrush currents and the internal faults. After detecting the over-current in the differential current signals, samples...

متن کامل

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order

We present a novel combined attack against ECC implementations that exploits specially crafted, but valid input points. The core idea is that after fault injection, these points turn into points of very low order. Using side channel information we deduce when the point at infinity occurs during the scalar multiplication, which leaks information about the secret key. In the best case, our attack...

متن کامل

A New SPN Type Architecture to Strengthen Block Cipher Against Fault Attack

In recent years, Differential Fault Analysis (DFA) has been proven as the most efficient technique to attack any block cipher by introducing a computational error. In this paper, a new Substitution Permutation Network (SPN) type architecture is proposed which has better resistance against DFA as compared to Advanced Encryption Standard (AES). The proposed architecture is similar to AES except r...

متن کامل

Fault Detection Scheme for AES Using Optimization for Mix Column

In this paper for existing concurrent structure independent fault detection schemes with new technique for the fault detection of sub bytes and inverse sub bytes using the relation between the input and output of the S-box, the formulation of mix column are implemented for AES, which results in the reduction of area coverage and power consumption along with the error coverage of greater than 99...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Internet Serv. Inf. Secur.

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2012