Cryptology ePrint Archive: Report 2009/575
Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault
Michael Tunstall and Debdeep Mukhopadhyay
Abstract: In this paper we present an enhanced Differential Fault Attack that can be applied to the AES using a single fault. We demonstrate that when a single random byte fault is induced that affects the input of the eighth round, the AES key can be deduced using a two stage algorithm. The first step, would be expected to reduce the possible key hypotheses to $2^{32}$, and the second step to a mere $2^{8}$. Furthermore, we show that, with certain faults, this can be further reduced to two key hypotheses.
Category / Keywords: implementation / Differential Fault Analysis
Date: received 25 Nov 2009, last revised 17 Feb 2011
Contact author: tunstall at cs bris ac uk
Available formats: PDF | BibTeX Citation
Note: A short version of this paper will appear in the proceedings of WISTP 2011
Version: 20110217:211003 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]