Paper 2012/446
Differential Fault Analysis of AES: Towards Reaching its Limits
Sk Subidh Ali, Debdeep Mukhopadhyay, and Michael Tunstall
Abstract
In this paper we present a theoretical analysis of the limits of the Differential Fault Analysis (DFA) of AES by developing an inter relationship between conventional cryptanalysis of AES and DFAs. We show that the existing attacks have not reached these limits and present techniques to reach these. More specifically, we propose optimal DFA on states of AES-128 and AES-256. We also propose attacks on the key schedule of the three versions of AES, and demonstrate that these are some of the most efficient attacks on AES to date. Our attack on AES-128 key schedule is optimal, and the attacks on AES-192 and AES-256 key schedule are very close to optimal. Detailed experimental results have been provided for the developed attacks. The work has been compared to other works and also the optimal limits of Differential Fault Analysis of AES.
Metadata
- Available format(s)
- PDF PS
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- AESAES key scheduleDifferential Fault AnalysisFault Model
- Contact author(s)
- subidh @ gmail com
- History
- 2012-08-06: received
- Short URL
- https://ia.cr/2012/446
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/446, author = {Sk Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential Fault Analysis of {AES}: Towards Reaching its Limits}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/446}, year = {2012}, url = {https://eprint.iacr.org/2012/446} }