首页> 外文会议>2012 7th International Conference on Computing and Convergence Technology >A practical analysis of fault attack countermeasure on AES using data masking
【24h】

A practical analysis of fault attack countermeasure on AES using data masking

机译:基于数据屏蔽的AES故障攻击对策实践分析

获取原文
获取原文并翻译 | 示例

摘要

The symmetric cryptographic system such as the advanced encryption standard (AES) is a favorite target for differential fault analysis. Tunstall et al. recently proposed a fault attack in which a secret key can be extracted by injecting only a one-byte fault on the AES. Countermeasures against fault analysis have been proposed, but they have a fault detection rate limit or additional costs for extra verification processes. We evaluate whether the AES implementation using Akkar and Giraud's data masking method, which was originally proposed to protect against power analysis attack, can defeat the fault injection attack. Based on practical experiments, we suggest that an AES adopting the masking method is sufficiently secure from existing fault injection techniques in real environments.
机译:对称加密系统(例如高级加密标准(AES))是差分故障分析的首选目标。 Tunstall等。最近,有人提出了一种故障攻击,其中可以通过仅在AES上注入一个字节错误来提取密钥。已经提出了针对故障分析的对策,但是它们具有故障检测率限制或额外的验证过程的额外成本。我们评估使用Akkar和Giraud的数据屏蔽方法实现的AES实现是否可以克服故障注入攻击,该方法最初是为防止功耗分析攻击而提出的。根据实际实验,我们认为采用掩蔽方法的AES与实际环境中现有的故障注入技术相比具有足够的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号