DFT 2013
Differential Analysis
- f Round-Reduced AES Faulty Ciphertexts
Amir-Pasha Mirbaha Jean-Max Dutertre Assia Tria
Differential Analysis of Round-Reduced AES Faulty Ciphertexts - - PowerPoint PPT Presentation
DFT 2013 Differential Analysis of Round-Reduced AES Faulty Ciphertexts Amir-Pasha Mirbaha Jean-Max Dutertre Assia Tria Outline Introduction State-of-the-art of the Round Reduction Analysis Theory of our attacks and the realizations
DFT 2013
Amir-Pasha Mirbaha Jean-Max Dutertre Assia Tria
2
3
AES-128
encryption algorithm
short initial round)
ten derived round keys
cryptanalysis is based on their iterated rounds.
threatening? Context: Laser fault injection on an unprotected 8-bit 16 MHz 0.35 µm microcontroller with an embedded AES
4
5
Vcc
A Round Reduction is an attack for skipping one or several iterative rounds due to a fault injection. A Round Reduction Analysis is a technique for finding the secret
corresponding reference value (e.g. the corresponnding plaintext
6
They resort to the DFA (Differential Fault Analysis) and use the corresponding plaintext or ciphertext as the reference.
disable the RRA threats?
7
Three RRA on AES are reported since 2005:
8
Rmax is a variable
in order to select between 128, 192 and 256 versions
which differ in only one round may be analyzed in order to reveal the key. The differential analysis requires two texts.
the encryption includes invalid round key values. Thus, two corresponding round-reduced encryptions which differ in two rounds are needed in order to reveal the key.
9
Because, the fault increases the RC to higher than the Rmax value. Thus, the algorithm searches for the invalid key values in the memory. For instance:
10
11
12
they are usually considered on the unprotected circuit.
controlling values.
suffice to disable the RRA threats.
technique and we realized 3 new attacks.
13
assia.tria@cea.fr
14