[Resource Topic] 2010/023: Differential Fault Analysis on AES with 192 and 256-Bit Keys

Welcome to the resource topic for 2010/023

Title:
Differential Fault Analysis on AES with 192 and 256-Bit Keys

Authors: Junko Takahashi, Toshinori Fukunaga

Abstract:

This paper describes a differential fault analysis (DFA) on AES with 192 and 256-bit keys. We show a new attack in which both 192 and 256-bit keys are retrieved within a feasible computational time. In order to verify the proposed attack and estimate the calculation time, we implement the proposed attack using C code on a PC. As a result, we successfully recover the original 192-bit key using 3 pairs of correct and faulty ciphertexts within 5 minutes, and 256-bit key using 2 pairs of correct and faulty ciphertexts and 2 pairs of correct and faulty plaintexts within 10 minutes.

ePrint: https://eprint.iacr.org/2010/023

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .