eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.
You are looking at a specific version 20100713:232741 of this paper. See the latest version.

Paper 2010/396

From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks

Noémie Floissac and Yann L'Hyver

Abstract

Since its announcement, AES has been subject to different DFA attacks. Most of these attacks target the AES with 128-bit key. However, the two other variants are nowadays deployed in various applications and are also submitted to the same attack path. In this paper, we adapt the DFA techniques originally used on AES-128 in order to obtain the keys of AES-192 and AES-256. To illustrate this method, we propose efficient attacks on AES-192 and AES-256 based on a known DFA on KeyExpansion.

Metadata
Available format(s)
PDF PS
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
DFAfault injectionAES-192AES-256adaptationextensionreproduction
Contact author(s)
y lhyver @ serma com
History
2010-07-13: received
Short URL
https://ia.cr/2010/396
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.