Cryptology ePrint Archive: Report 2010/636
Differential Fault Analysis of AES using a Single Multiple-Byte Fault
Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall
Abstract: In this paper we present an improved fault attack on the Advanced Encryption
Standard (AES). This paper presents an improvement on a recently published
differential fault analysis of AES that requires one fault to recover the secret
key being used. This attack requires that one byte entering into the eighth round is
corrupted. We show that the attack is possible where more than one byte has been
affected. Experimental results are described where a fault is injected using a glitch in
the clock, demonstrating that this attack is practical.
Category / Keywords: implementation /
Date: received 14 Dec 2010
Contact author: debdeep mukhopadhyay at gmail com
Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20101215:130230 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]