Cryptology ePrint Archive: Report 2010/336
Efficient Differential Fault Analysis for AES
Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
Abstract: This paper proposes improved post analysis methods for Differential Fault Analysis (DFA) against AES. In detail, we propose three techniques to improve the attack efficiency as 1) combining previous DFA methods, 2) performing a divide-and-conquer attack by considering the AES key-schedule structure, and 3) taking the linearity of the MixColumns operation into account. As a result, the expectation of the analysis time in the previous work can be reduced to about one sixteenth.
Notice that these improvements are based on the detailed analysis of the previous DFA methods and the calculation time and memory cost in practical implementations. Moreover, the proposed techniques can be widely applied to DFA attacks under different assumptions.
Category / Keywords: secret-key cryptography / Fault Analysis Attack, DFA, AES, Divide-and-Conquer
Date: received 9 Jun 2010
Contact author: g-shigeto-lfat at ice uec ac jp
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20100613:182125 (All versions of this report)
Short URL: ia.cr/2010/336
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]