Abstract
DFA is no new attack. It was first used by Biham and Shamir who took unfair advantage of DES Feistel structure to carry it out. This structure is not present in AES. Nevertheless, is DFA able to attack AES another way? This article aims at setting out a means of applying DFA to AES that exploits AES internal structure. We can break an AES128 key with ten faulty messages within a few minutes.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
FIPS PUB 197: Avanced Encryption Standard, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Daemen, J., Rijmen, V.: The Design of Rijndael, AES – The Advanced Encryption Standard, p. 238. Springer, Heidelberg (2002)
Anderson, R.J., Kuhn, M.G.: Tamper Resistance – a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, November 18-21, pp. 1–11 (1996) ISBN 1-880446-83-9
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems, CS 0910. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Daemen, J.: Annex to AES Proposal Rijndael (1998), http://www.esat.kuleuven.ac.be/~rijmen/rijndael/PropCorr.PDF
Nyberg, K.: Differentially uniform mappings for cryptography. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 55–64. Springer, Heidelberg (1994)
Letourneux, G.: Rapport de stage EDSI: Etude et implémentation de l’AES, Attaques DPA et DFA, August 30 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dusart, P., Letourneux, G., Vivolo, O. (2003). Differential Fault Analysis on A.E.S. In: Zhou, J., Yung, M., Han, Y. (eds) Applied Cryptography and Network Security. ACNS 2003. Lecture Notes in Computer Science, vol 2846. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45203-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-45203-4_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20208-0
Online ISBN: 978-3-540-45203-4
eBook Packages: Springer Book Archive