Paper 2010/396
From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks
Noémie Floissac and Yann L'Hyver
Abstract
Since its announcement, AES has been subject to different DFA attacks. Most of these attacks target the AES with 128-bit key. However, the two other variants are nowadays deployed in various applications and are also submitted to the same attack path. In this paper, we adapt the DFA techniques originally used on AES-128 in order to obtain the keys of AES-192 and AES-256. To illustrate this method, we propose efficient attacks on AES-192 and AES-256 based on a known DFA on KeyExpansion.
Metadata
- Available format(s)
- PDF PS
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- DFAfault injectionAES-192AES-256adaptationextensionreproduction
- Contact author(s)
- y lhyver @ serma com
- History
- 2010-07-13: received
- Short URL
- https://ia.cr/2010/396
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2010/396, author = {Noémie Floissac and Yann L'Hyver}, title = {From {AES}-128 to {AES}-192 and {AES}-256, How to Adapt Differential Fault Analysis Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2010/396}, year = {2010}, url = {https://eprint.iacr.org/2010/396} }