作者
Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta
发表日期
2012/2
期刊
Information Forensics and Security, IEEE Transactions on
卷号
7
期号
1
页码范围
109-120
出版商
IEEE
简介
This paper presents a comprehensive analysis of differential fault analysis (DFA) attacks on the Advanced Encryption Standard (AES) from an information-theoretic perspective. Injecting faults into cryptosystems is categorized as an active at tack where attackers induce an error in operations to retrieve the secret internal information, e.g., the secret key of ciphers. Here, we consider DFA attacks as equivalent to a special kind of passive attack where attackers can obtain leaked information without measurement noise. The DFA attacks are regarded as a conversion process from the leaked information to the secret key. Each fault model defines an upper bound for the amount of leaked information. The optimal DFA attacks should be able to exploit fully the leaked information in order to retrieve the secret key with a practical level of complexity. This paper discusses a new DFA methodology to achieve the optimal DFA …
引用总数
201220132014201520162017201820192020202120222023421056129129834
学术搜索中的文章
K Sakiyama, Y Li, M Iwamoto, K Ohta - IEEE Transactions on Information Forensics and …, 2011