Fault attack for the iterative operation of AES S-Box

  • Jea Hoon Park
  • , Sang Jae Moon
  • , Doo Ho Choi
  • , You Sung Kang
  • , Jae Cheol Ha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

This paper presents a practical Differential Fault Analysis (DFA) method for the iterative operation on the SubBytes transformation AES. To inject a fault to the iterative operation, we conduct an experiment using a laser injection tool. And, then to deduce the last round key, we analyze the relationship between the input of S-Box and the output of S-Box. Based on a computer analysis, our proposal fault attack retrieves the AES 128-bit secret key with about 211 complexity in average using one pair of correct and faulty ciphertext.

Original languageEnglish
Title of host publicationProceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010
Pages550-555
Number of pages6
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010 - Seoul, Korea, Republic of
Duration: 2010 Nov 302010 Dec 2

Publication series

NameProceeding - 5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010

Other

Other5th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2010
Country/TerritoryKorea, Republic of
CitySeoul
Period10/11/3010/12/2

Keywords

  • AES
  • Fault attack
  • Laser fault
  • S-Box

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Information Systems

Fingerprint

Dive into the research topics of 'Fault attack for the iterative operation of AES S-Box'. Together they form a unique fingerprint.

Cite this