Combined Fault and Side-Channel Attacks on the AES Key Schedule

François Dassance, Alexandre Venelli
{"title":"Combined Fault and Side-Channel Attacks on the AES Key Schedule","authors":"François Dassance, Alexandre Venelli","doi":"10.1109/FDTC.2012.10","DOIUrl":null,"url":null,"abstract":"We present combined attacks on the AES key schedule based on the work of Roche et al. [1]. The main drawbacks of the original attack are: the need for high repeatability of the fault, a very particular fault model and a very high complexity of the key recovery algorithm. We consider more practical fault models, we obtain improved key recovery algorithms and we present more attack paths for combined attacks on AES. We propose to inject faults on the different operations of the key schedule instead of the key state of round 9 or the corresponding data state. We also consider fault injections in AES constants such as the RCon or the affine transformation of the SubWord. By corrupting these constants, the attacker can easily deduce the value of the error. The key recovery complexity can then be greatly improved. Notably, we can obtain a complexity identical to a classical differential side-channel attack. Our attacks defeat most AES implementations secure against both high-order side-channel attacks and fault attacks.","PeriodicalId":165647,"journal":{"name":"2012 Workshop on Fault Diagnosis and Tolerance in Cryptography","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"26","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Workshop on Fault Diagnosis and Tolerance in Cryptography","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FDTC.2012.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 26

Abstract

We present combined attacks on the AES key schedule based on the work of Roche et al. [1]. The main drawbacks of the original attack are: the need for high repeatability of the fault, a very particular fault model and a very high complexity of the key recovery algorithm. We consider more practical fault models, we obtain improved key recovery algorithms and we present more attack paths for combined attacks on AES. We propose to inject faults on the different operations of the key schedule instead of the key state of round 9 or the corresponding data state. We also consider fault injections in AES constants such as the RCon or the affine transformation of the SubWord. By corrupting these constants, the attacker can easily deduce the value of the error. The key recovery complexity can then be greatly improved. Notably, we can obtain a complexity identical to a classical differential side-channel attack. Our attacks defeat most AES implementations secure against both high-order side-channel attacks and fault attacks.
AES密钥调度的组合故障和侧信道攻击
基于Roche等人[1]的工作,我们提出了针对AES密钥调度的组合攻击。原始攻击的主要缺点是:对故障的重复性要求高,故障模型非常特殊,密钥恢复算法的复杂度很高。我们考虑了更实际的故障模型,得到了改进的密钥恢复算法,并提出了针对AES的组合攻击的更多攻击路径。我们建议在密钥调度的不同操作上注入故障,而不是第9轮的密钥状态或相应的数据状态。我们还考虑AES常数中的错误注入,如RCon或SubWord的仿射变换。通过破坏这些常量,攻击者可以很容易地推断出错误的值。这样就可以大大提高密钥恢复的复杂性。值得注意的是,我们可以获得与经典差分边信道攻击相同的复杂度。我们的攻击失败大多数AES实现安全高阶边信道攻击和故障攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信