Differential Fault Analysis against AES-192 and AES-256 with Minimal - - PowerPoint PPT Presentation

differential fault analysis against aes 192 and aes 256
SMART_READER_LITE
LIVE PREVIEW

Differential Fault Analysis against AES-192 and AES-256 with Minimal - - PowerPoint PPT Presentation

Outline Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults Chong Hee KIM Information Security Group Universit e Catholique de Louvain, Belgium August 21, 2010 Chong Hee KIM, Universit e Catholique de Louvain


slide-1
SLIDE 1

Outline

Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults

Chong Hee KIM

Information Security Group Universit´ e Catholique de Louvain, Belgium

August 21, 2010

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-2
SLIDE 2

Outline

Outline

1 Introduction

Differential fault analysis against AES AES AES key scheduling

2 Fault model and basic concept of DFA against AES

Fault model Basic concept of DFA against AES-128

3 Proposed attacks

DFA against AES-192 DFA against AES-256

4 Comparison and conclusions

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-3
SLIDE 3

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

Outline

1 Introduction

Differential fault analysis against AES AES AES key scheduling

2 Fault model and basic concept of DFA against AES

Fault model Basic concept of DFA against AES-128

3 Proposed attacks

DFA against AES-192 DFA against AES-256

4 Comparison and conclusions

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-4
SLIDE 4

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

Differential fault analysis

DFA (Differential fault analysis) DFA uses differential information between correct and faulty ciphertexts to figure out the secret key Normally attacker gets faulty ciphertexts by giving external impact with voltage variation, glitch, laser, etc The first DFA: against DES by Biham and Shamir, 1997 DFA against AES-128 Piret and Quisquater (2003)

2 pairs, practical fault model (random byte error)

Fukunaga and Takahashi: 1 pair with 232 exhaustive search (8-35 minutes at Core2 Duo 3.0GHz PC) Tunstall and Mukhopadhyay: 1 pair with 28 exhaustive search

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-5
SLIDE 5

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

Differential fault analysis

DFA (Differential fault analysis) DFA uses differential information between correct and faulty ciphertexts to figure out the secret key Normally attacker gets faulty ciphertexts by giving external impact with voltage variation, glitch, laser, etc The first DFA: against DES by Biham and Shamir, 1997 DFA against AES-128 Piret and Quisquater (2003)

2 pairs, practical fault model (random byte error)

Fukunaga and Takahashi: 1 pair with 232 exhaustive search (8-35 minutes at Core2 Duo 3.0GHz PC) Tunstall and Mukhopadhyay: 1 pair with 28 exhaustive search

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-6
SLIDE 6

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

Differential fault analysis

DFA against AES-192 and AES-256 Application of Piret and Quisquter’s: 4 pairs 2009, Li et al.: 16 or 3000 pairs 2010, Barenghi et al.: 16 pairs 2010, Takahashi and Fukunaga: 3 pairs for AES-192, 4 pairs for AES-256 (2 faulty plaintexts) Proposed methods: 2 pairs for AES-192, 3 pairs for AES-256

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-7
SLIDE 7

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES

Plaintext

K0

MixCol Shift rows Sub bytes

K1

MixCol Shift rows Sub bytes

Kr-1

Shift rows Sub bytes

Kr

Ciphertext

1 r-1 r

Intermediate result, called State, is represented as a two-dimensional byte array with 4 rows and 4 columns

S(0,0) S(0,1) S(0,2) S(0,3) S(1,0) S(1,1) S(1,2) S(1,3) S(2,0) S(2,1) S(2,2) S(2,3) S(3,0) S(3,1) S(3,2) S(3,3)

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-8
SLIDE 8

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES

Plaintext

K0

MixCol Shift rows Sub bytes

K1

MixCol Shift rows Sub bytes

Kr-1

Shift rows Sub bytes

Kr

Ciphertext

1 r-1 r

Each round is composed of 4 transformations except the last round:

SubBytes: 16 identical 8 × 8 S-boxes, non-linear byte substitution ShiftRows: Each row is cyclically shifed over different offsets MixColumns: A linear transformation to each column AddRoundKey: A bitwise XOR with a round key

Number of rounds Key length Number of rounds r AES-128 128 10 AES-192 192 12 AES-256 256 14

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-9
SLIDE 9

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES

Plaintext

K0

MixCol Shift rows Sub bytes

K1

MixCol Shift rows Sub bytes

Kr-1

Shift rows Sub bytes

Kr

Ciphertext

1 r-1 r

Each round is composed of 4 transformations except the last round:

SubBytes: 16 identical 8 × 8 S-boxes, non-linear byte substitution ShiftRows: Each row is cyclically shifed over different offsets MixColumns: A linear transformation to each column AddRoundKey: A bitwise XOR with a round key

Number of rounds Key length Number of rounds r AES-128 128 10 AES-192 192 12 AES-256 256 14

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-10
SLIDE 10

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES

Plaintext

K0

MixCol Shift rows Sub bytes

K1

MixCol Shift rows Sub bytes

Kr-1

Shift rows Sub bytes

Kr

Ciphertext

1 r-1 r

Each round is composed of 4 transformations except the last round:

SubBytes: 16 identical 8 × 8 S-boxes, non-linear byte substitution ShiftRows: Each row is cyclically shifed over different offsets MixColumns: A linear transformation to each column AddRoundKey: A bitwise XOR with a round key

Number of rounds Key length Number of rounds r AES-128 128 10 AES-192 192 12 AES-256 256 14

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-11
SLIDE 11

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES

Plaintext

K0

MixCol Shift rows Sub bytes

K1

MixCol Shift rows Sub bytes

Kr-1

Shift rows Sub bytes

Kr

Ciphertext

1 r-1 r

Each round is composed of 4 transformations except the last round:

SubBytes: 16 identical 8 × 8 S-boxes, non-linear byte substitution ShiftRows: Each row is cyclically shifed over different offsets MixColumns: A linear transformation to each column AddRoundKey: A bitwise XOR with a round key

Number of rounds Key length Number of rounds r AES-128 128 10 AES-192 192 12 AES-256 256 14

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-12
SLIDE 12

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES key scheduling

3 7 11 4 8 12 RotWord SubWord Rcon RotWord SubWord Rcon 15 16

AES - 128

3 7 11 4 8 12 RotWord SubWord Rcon RotWord SubWord Rcon 15 16

AES - 192

11 12 15 16

K10 K9 K12 K11

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-13
SLIDE 13

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Differential fault analysis against AES AES AES key scheduling

AES key scheduling

3 7 11 4 8 12 RotWord SubWord Rcon RotWord SubWord Rcon 15 16

AES - 256

11 12 15 16 11 12 15 16

K14 K13

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-14
SLIDE 14

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Outline

1 Introduction

Differential fault analysis against AES AES AES key scheduling

2 Fault model and basic concept of DFA against AES

Fault model Basic concept of DFA against AES-128

3 Proposed attacks

DFA against AES-192 DFA against AES-256

4 Comparison and conclusions

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-15
SLIDE 15

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Fault model

We assume that

a byte of the AES intermediate state is corrupted by fault injection the corrupted value is random and unkonw to the attacker

Location of corrupted byte among 16 bytes

may be known to the attacker: ex) in [6], it was shown that precise control of fault injection was possible may be not: perform 16 independent equivalent analysis we assume that the attacker knows the location

We assume that the attacker can get a pair of correct and faulty ciphertexts

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-16
SLIDE 16

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Fault model

We assume that

a byte of the AES intermediate state is corrupted by fault injection the corrupted value is random and unkonw to the attacker

Location of corrupted byte among 16 bytes

may be known to the attacker: ex) in [6], it was shown that precise control of fault injection was possible may be not: perform 16 independent equivalent analysis we assume that the attacker knows the location

We assume that the attacker can get a pair of correct and faulty ciphertexts

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-17
SLIDE 17

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Fault model

We assume that

a byte of the AES intermediate state is corrupted by fault injection the corrupted value is random and unkonw to the attacker

Location of corrupted byte among 16 bytes

may be known to the attacker: ex) in [6], it was shown that precise control of fault injection was possible may be not: perform 16 independent equivalent analysis we assume that the attacker knows the location

We assume that the attacker can get a pair of correct and faulty ciphertexts

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-18
SLIDE 18

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

Based on Piret and Quisquater’s method + recent improvement A 1-byte fault between MixColumns of rounds 7th and 8th

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-19
SLIDE 19

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-20
SLIDE 20

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-21
SLIDE 21

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-22
SLIDE 22

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-23
SLIDE 23

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10 232

∆S10

(0,0) = 2σ,

∆S10

(1,0) = σ,

∆S10

(2,0) = σ,

∆S10

(3,0) = 3σ.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-24
SLIDE 24

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

SB−1(C0,0 ⊕ K 10

0,0) ⊕ SB−1(C ∗ 0,0 ⊕ K 10 0,0) =

2σ, SB−1(C1,3 ⊕ K 10

1,3) ⊕ SB−1(C ∗ 1,3 ⊕ K 10 1,3) =

σ, SB−1(C2,2 ⊕ K 10

2,2) ⊕ SB−1(C ∗ 2,2 ⊕ K 10 2,2) =

σ, SB−1(C3,1 ⊕ K 10

3,1) ⊕ SB−1(C ∗ 3,1 ⊕ K 10 3,1) =

3σ.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-25
SLIDE 25

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10 232

∆S10

(0,0) = 2σ,

∆S10

(1,0) = σ,

∆S10

(2,0) = σ,

∆S10

(3,0) = 3σ.

Among 232 candidates, in average 28 candidates satisfy equations.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-26
SLIDE 26

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10 232 28

∆S10

(0,0) = 2σ,

∆S10

(1,0) = σ,

∆S10

(2,0) = σ,

∆S10

(3,0) = 3σ.

Among 232 candidates, in average 28 candidates satisfy equations.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-27
SLIDE 27

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 Differential equations S10 2128 232

For other columns we construct similiar equations. We have 232 candidates for K 10. With 2 pairs, we have the correct key K 10.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-28
SLIDE 28

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8

According to [12], we can further reduce the number of candidates to 28.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-29
SLIDE 29

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 232 232

According to [12], we can further reduce the number of candidates to 28.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-30
SLIDE 30

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 232 232 Differential equations S9

According to [12], we can further reduce the number of candidates to 28.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-31
SLIDE 31

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions Fault model Basic concept of DFA against AES-128

Basic concept of DFA against AES-128

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K10 K9 K8 232 232 Differential equations S9 28

According to [12], we can further reduce the number of candidates to 28.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-32
SLIDE 32

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

Outline

1 Introduction

Differential fault analysis against AES AES AES key scheduling

2 Fault model and basic concept of DFA against AES

Fault model Basic concept of DFA against AES-128

3 Proposed attacks

DFA against AES-192 DFA against AES-256

4 Comparison and conclusions

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-33
SLIDE 33

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

Objective

With a current normal PC, an exhaustive search of 232 can be done within tens of minutes. Therefore we try to minimize the required number of faults with up to 232 exhaustive search.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-34
SLIDE 34

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

Attack procedure

1 Obtain 2 pairs of (C1, C ∗

1 ) and (C2, C ∗ 2 ). Where the faults are

injected between MixColumns of round 9 and 10.

2 Find K 12. 3 Find the left-half of K 11 with key schedule. 4 Find 232 candidates for the right-half of K 11. 5 Find the master secret key with an exhaustive search of 232. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-35
SLIDE 35

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

Attack procedure

1 Obtain 2 pairs of (C1, C ∗

1 ) and (C2, C ∗ 2 ). Where the faults are

injected between MixColumns of round 9 and 10.

2 Find K 12. 3 Find the left-half of K 11 with key schedule. 4 Find 232 candidates for the right-half of K 11. 5 Find the master secret key with an exhaustive search of 232. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-36
SLIDE 36

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

Attack procedure

1 Obtain 2 pairs of (C1, C ∗

1 ) and (C2, C ∗ 2 ). Where the faults are

injected between MixColumns of round 9 and 10.

2 Find K 12. 3 Find the left-half of K 11 with key schedule. 4 Find 232 candidates for the right-half of K 11. 5 Find the master secret key with an exhaustive search of 232. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-37
SLIDE 37

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

Attack procedure

1 Obtain 2 pairs of (C1, C ∗

1 ) and (C2, C ∗ 2 ). Where the faults are

injected between MixColumns of round 9 and 10.

2 Find K 12. 3 Find the left-half of K 11 with key schedule. 4 Find 232 candidates for the right-half of K 11. 5 Find the master secret key with an exhaustive search of 232. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-38
SLIDE 38

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

Attack procedure

1 Obtain 2 pairs of (C1, C ∗

1 ) and (C2, C ∗ 2 ). Where the faults are

injected between MixColumns of round 9 and 10.

2 Find K 12. 3 Find the left-half of K 11 with key schedule. 4 Find 232 candidates for the right-half of K 11. 5 Find the master secret key with an exhaustive search of 232. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-39
SLIDE 39

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

Attack procedure

1 Obtain 2 pairs of (C1, C ∗

1 ) and (C2, C ∗ 2 ). Where the faults are

injected between MixColumns of round 9 and 10.

2 Find K 12. 3 Find the left-half of K 11 with key schedule. 4 Find 232 candidates for the right-half of K 11. 5 Find the master secret key with an exhaustive search of 232. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-40
SLIDE 40

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 K10 Differential equations S12 Key Schedule

1 Find K 12 with 2 pairs 2 Find the left-half of K 11

with key schedule

3 Find 232 candidates for

the right-half of K 11

4 Find the master secret

key with an exhaustive search of 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-41
SLIDE 41

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 K10 Differential equations S12 Key Schedule

1 Find K 12 with 2 pairs 2 Find the left-half of K 11

with key schedule

3 Find 232 candidates for

the right-half of K 11

4 Find the master secret

key with an exhaustive search of 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-42
SLIDE 42

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12

1 Find K 12 with 2 pairs 2 Find the left-half of K 11

with key schedule

3 Find 232 candidates for

the right-half of K 11

4 Find the master secret

key with an exhaustive search of 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-43
SLIDE 43

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12 232 224 216 1st pair 2nd pair

1 Find K 12 with 2 pairs 2 Find the left-half of K 11

with key schedule

3 Find 232 candidates for

the right-half of K 11

4 Find the master secret

key with an exhaustive search of 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-44
SLIDE 44

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12 232 224 216 1st pair 2nd pair 232 224 216

1 Find K 12 with 2 pairs 2 Find the left-half of K 11

with key schedule

3 Find 232 candidates for

the right-half of K 11

4 Find the master secret

key with an exhaustive search of 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-45
SLIDE 45

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 1

3 7 11 4 8 12 RotWord SubWord Rcon RotWord SubWord Rcon 15 16

AES - 192

11 12 15 16

K12 K11

1 Find K 12 with 2 pairs 2 Find the left-half of K 11

with key schedule

3 Find 232 candidates for

the right-half of K 11

4 Find the master secret

key with an exhaustive search of 232

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-46
SLIDE 46

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-47
SLIDE 47

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-48
SLIDE 48

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-49
SLIDE 49

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-50
SLIDE 50

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-51
SLIDE 51

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-52
SLIDE 52

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-53
SLIDE 53

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

Attack procedure

1 Obtain a pair of (C1, C ∗

1 ). Where the faults are injected

between MixColumns of round 9 and 10.

2 Obtain a pair of (C2, C ∗

2 ). Where the faults are injected

between MixColumns of round 8 and 9

3 Find 232 candidates for K 12 with (C1, C ∗

1 ).

4 Compute the 232 for left-half of K 11 with key schedule. 5 Reduce the candidates for K 12 and the left-half of K 11 to 224. 6 Find the left-half of K 11 and K 12 with (C2, C ∗

2 ).

7 Find the 28 candidates for right-half of K 11 with (C2, C ∗

2 ).

8 Find the MC −1(K 11) with (C1, C ∗

1 ).

9 Compute master secret key. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-54
SLIDE 54

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 K10 Differential equations S12 Key Schedule 232

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-55
SLIDE 55

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 K10 Differential equations S12 Key Schedule 232 232

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-56
SLIDE 56

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12 232 232 232

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-57
SLIDE 57

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12 232 232 232 224 224

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-58
SLIDE 58

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K10 K9

MixCol Shift rows Sub bytes

K11

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-59
SLIDE 59

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12 224 224 224

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-60
SLIDE 60

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12 224 224 224 1 1

1 Find 232 candidates for

K 12 with (C1, C ∗

1 )

2 Compute the 232

candidates for left-half of K 11 with key schedule.

3 Reduce the candidates for

K 12 and the left-half of K 11 to 224.

4 Find the left-half of K 11

and K 12 with (C2, C ∗

2 ).

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-61
SLIDE 61

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K11 Differential equations S11 S12

5 Find the 28 candidates for

right-half of K 11 with (C2, C ∗

2 ).

6 Find the MC −1(K 11) with

(C1, C ∗

1 ).

7 Compute the master

secret key.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-62
SLIDE 62

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K12 K10 Differential equations S10 MC-1(K11) 28

5 Find the 28 candidates for

right-half of K 11 with (C2, C ∗

2 ).

6 Find the MC −1(K 11) with

(C1, C ∗

1 ).

7 Compute the master

secret key.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-63
SLIDE 63

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-192: Method 2

3 7 11 4 8 12 RotWord SubWord Rcon RotWord SubWord Rcon 15 16

AES - 192

11 12 15 16

K12 K11

5 Find the 28 candidates for

right-half of K 11 with (C2, C ∗

2 ).

6 Find the MC −1(K 11) with

(C1, C ∗

1 ).

7 Compute the master

secret key.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-64
SLIDE 64

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

Attack procedure

1 Obtain two pairs of correct and faulty ciphertexts (C1, C ∗

1 )

and (C2, C ∗

2 ) by giving faults between MixColumns of round

11 and 12.

2 Obtain a pair of correct and faulty ciphertexts (C3, C ∗

3 ) by

giving faults between MixColumns of round 10 and 11.

3 Find K 14 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

4 Find 232 candidates for MC −1(K 13) with (C3, C ∗

3 ).

5 Find K 13 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

6 Find the master secret key with key scheduling. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-65
SLIDE 65

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

Attack procedure

1 Obtain two pairs of correct and faulty ciphertexts (C1, C ∗

1 )

and (C2, C ∗

2 ) by giving faults between MixColumns of round

11 and 12.

2 Obtain a pair of correct and faulty ciphertexts (C3, C ∗

3 ) by

giving faults between MixColumns of round 10 and 11.

3 Find K 14 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

4 Find 232 candidates for MC −1(K 13) with (C3, C ∗

3 ).

5 Find K 13 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

6 Find the master secret key with key scheduling. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-66
SLIDE 66

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

Attack procedure

1 Obtain two pairs of correct and faulty ciphertexts (C1, C ∗

1 )

and (C2, C ∗

2 ) by giving faults between MixColumns of round

11 and 12.

2 Obtain a pair of correct and faulty ciphertexts (C3, C ∗

3 ) by

giving faults between MixColumns of round 10 and 11.

3 Find K 14 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

4 Find 232 candidates for MC −1(K 13) with (C3, C ∗

3 ).

5 Find K 13 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

6 Find the master secret key with key scheduling. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-67
SLIDE 67

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

Attack procedure

1 Obtain two pairs of correct and faulty ciphertexts (C1, C ∗

1 )

and (C2, C ∗

2 ) by giving faults between MixColumns of round

11 and 12.

2 Obtain a pair of correct and faulty ciphertexts (C3, C ∗

3 ) by

giving faults between MixColumns of round 10 and 11.

3 Find K 14 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

4 Find 232 candidates for MC −1(K 13) with (C3, C ∗

3 ).

5 Find K 13 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

6 Find the master secret key with key scheduling. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-68
SLIDE 68

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

Attack procedure

1 Obtain two pairs of correct and faulty ciphertexts (C1, C ∗

1 )

and (C2, C ∗

2 ) by giving faults between MixColumns of round

11 and 12.

2 Obtain a pair of correct and faulty ciphertexts (C3, C ∗

3 ) by

giving faults between MixColumns of round 10 and 11.

3 Find K 14 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

4 Find 232 candidates for MC −1(K 13) with (C3, C ∗

3 ).

5 Find K 13 with (C1, C ∗

1 ) and (C2, C ∗ 2 ).

6 Find the master secret key with key scheduling. Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-69
SLIDE 69

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K14 K13 K12 Differential equations S14

1 Find K 14 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

2 Find 232 candidates for

MC −1(K 13) with (C3, C ∗

3 ).

3 Find K 13 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

4 Find the master secret

key with key scheduling.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-70
SLIDE 70

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K14 K12 K11

MixCol Shift rows Sub bytes

MC-1(K13) Differential equations S13 S14

1 Find K 14 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

2 Find 232 candidates for

MC −1(K 13) with (C3, C ∗

3 ).

3 Find K 13 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

4 Find the master secret

key with key scheduling.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-71
SLIDE 71

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

MixCol MixCol Shift rows Sub bytes Shift rows Sub bytes

K14 K12 Differential equations S12 MC-1(K13) 232

1 Find K 14 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

2 Find 232 candidates for

MC −1(K 13) with (C3, C ∗

3 ).

3 Find K 13 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

4 Find the master secret

key with key scheduling.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-72
SLIDE 72

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions DFA against AES-192 DFA against AES-256

DFA against AES-256

3 7 11 4 8 12 RotWord SubWord Rcon RotWord SubWord Rcon 15 16

AES - 256

11 12 15 16 11 12 15 16

K14 K13

1 Find K 14 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

2 Find 232 candidates for

MC −1(K 13) with (C3, C ∗

3 ).

3 Find K 13 with (C1, C ∗

1 )

and (C2, C ∗

2 ).

4 Find the master secret

key with key scheduling.

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-73
SLIDE 73

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions

Outline

1 Introduction

Differential fault analysis against AES AES AES key scheduling

2 Fault model and basic concept of DFA against AES

Fault model Basic concept of DFA against AES-128

3 Proposed attacks

DFA against AES-192 DFA against AES-256

4 Comparison and conclusions

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-74
SLIDE 74

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions

Comparisons with existing DFA’s against AES-192

Reference Fault model

  • No. of

Exhaustive faults search Piret and Quisquater 1 byte 4 1 Li et al. method 1 1-4 bytes 12† 1 Li et al. method 2 4 bytes 3000† 1 Barenghi et al. 1 byte 16† 1 Takahashi and Fukunaga 1 byte 3 28 Our attack 1 1 byte 2 232 Our attack 2 1 byte 2 1

†: with same plaintext

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-75
SLIDE 75

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions

Comparisons with existing DFA’s against AES-256

Reference Fault model

  • No. of

Exhaustive faults search Piret and Quisquater 1 byte 4 1 Li et al. method 1 1-4 bytes 12† 1 Li et al. method 2 4 bytes 3000† 1 Barenghi et al. 1 byte 16† 1 Takahashi and Fukunaga 1 byte 4‡ 213 Our attack 1 byte 3 1

†: with same plaintext ‡: 2 faulty plaintexts and 2 faulty ciphertexts

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults

slide-76
SLIDE 76

Introduction Fault model and basic concept of DFA against AES Proposed attacks Comparison and conclusions

Questions and answers

Thank you! Questions?

Chong Hee KIM, Universit´ e Catholique de Louvain DFA against AES-192 and AES-256 with Minimal Faults