Efficient Method For Random Fault Attack Against Aes Hardware Implementation

2016 China Semiconductor Technology International Conference (CSTIC)(2016)

引用 0|浏览53
暂无评分
摘要
Random fault attacks against Advanced Encryption Standard (AES) hardware implementation are widely researched. In the previous fault analysis, 6 rounds of attacks arc required to recover the correct round-key, which is not efficient enough for extensive analysis. In this paper. a more efficient fault model is proposed. Based on the analysis of theoretical key candidate number, the proposed attack method can complete the analysis as few as 3 rounds. Experiment results shows that nearly 90% of the attacks recover the correct round-key with 3 rounds and in average only 3.125 rounds are required with our proposed attack method.
更多
查看译文
关键词
random fault attack,AES hardware,advanced encryption standard,fault analysis,round-key correction,theoretical key candidate number analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要