Efficient Method For Random Fault Attack Against Aes Hardware Implementation
2016 China Semiconductor Technology International Conference (CSTIC)(2016)
摘要
Random fault attacks against Advanced Encryption Standard (AES) hardware implementation are widely researched. In the previous fault analysis, 6 rounds of attacks arc required to recover the correct round-key, which is not efficient enough for extensive analysis. In this paper. a more efficient fault model is proposed. Based on the analysis of theoretical key candidate number, the proposed attack method can complete the analysis as few as 3 rounds. Experiment results shows that nearly 90% of the attacks recover the correct round-key with 3 rounds and in average only 3.125 rounds are required with our proposed attack method.
更多查看译文
关键词
random fault attack,AES hardware,advanced encryption standard,fault analysis,round-key correction,theoretical key candidate number analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要