[Resource Topic] 2010/636: Differential Fault Analysis of AES using a Single Multiple-Byte Fault

Welcome to the resource topic for 2010/636

Title:
Differential Fault Analysis of AES using a Single Multiple-Byte Fault

Authors: Subidh Ali, Debdeep Mukhopadhyay, Michael Tunstall

Abstract:

In this paper we present an improved fault attack on the Advanced Encryption Standard (AES). This paper presents an improvement on a recently published differential fault analysis of AES that requires one fault to recover the secret key being used. This attack requires that one byte entering into the eighth round is corrupted. We show that the attack is possible where more than one byte has been affected. Experimental results are described where a fault is injected using a glitch in the clock, demonstrating that this attack is practical.

ePrint: https://eprint.iacr.org/2010/636

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .