Item type |
Journal(1) |
公開日 |
2014-02-15 |
タイトル |
|
|
タイトル |
Practical DFA Strategy for AES Under Limited-access Conditions |
タイトル |
|
|
言語 |
en |
|
タイトル |
Practical DFA Strategy for AES Under Limited-access Conditions |
言語 |
|
|
言語 |
eng |
キーワード |
|
|
主題Scheme |
Other |
|
主題 |
[特集:組込みシステム工学] cryptography, advance encryption standard, differential fault analysis, intentional electromagnetic interference, uncertain faults. |
資源タイプ |
|
|
資源タイプ識別子 |
http://purl.org/coar/resource_type/c_6501 |
|
資源タイプ |
journal article |
著者所属 |
|
|
|
The University of Electro-Communications |
著者所属 |
|
|
|
The University of Electro-Communications |
著者所属 |
|
|
|
The University of Electro-Communications |
著者所属 |
|
|
|
Tohoku University |
著者所属 |
|
|
|
The University of Electro-Communications |
著者所属 |
|
|
|
Tohoku University |
著者所属 |
|
|
|
Tohoku University |
著者所属 |
|
|
|
The University of Electro-Communications |
著者所属(英) |
|
|
|
en |
|
|
The University of Electro-Communications |
著者所属(英) |
|
|
|
en |
|
|
The University of Electro-Communications |
著者所属(英) |
|
|
|
en |
|
|
The University of Electro-Communications |
著者所属(英) |
|
|
|
en |
|
|
Tohoku University |
著者所属(英) |
|
|
|
en |
|
|
The University of Electro-Communications |
著者所属(英) |
|
|
|
en |
|
|
Tohoku University |
著者所属(英) |
|
|
|
en |
|
|
Tohoku University |
著者所属(英) |
|
|
|
en |
|
|
The University of Electro-Communications |
著者名 |
Kazuo, Sakiyama
Yang, Li
Shigeto, Gomisawa
Yu-ichiHayashi
Mitsugu, Iwamoto
Naofumi, Homma
Takafumi, Aoki
Kazuo, Ohta
|
著者名(英) |
Kazuo, Sakiyama
Yang, Li
Shigeto, Gomisawa
Yu-ichi, Hayashi
Mitsugu, Iwamoto
Naofumi, Homma
Takafumi, Aoki
Kazuo, Ohta
|
論文抄録 |
|
|
内容記述タイプ |
Other |
|
内容記述 |
Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.
------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online) DOI http://dx.doi.org/10.2197/ipsjjip.22.142 ------------------------------ |
論文抄録(英) |
|
|
内容記述タイプ |
Other |
|
内容記述 |
Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.
------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online) DOI http://dx.doi.org/10.2197/ipsjjip.22.142 ------------------------------ |
書誌レコードID |
|
|
収録物識別子タイプ |
NCID |
|
収録物識別子 |
AN00116647 |
書誌情報 |
情報処理学会論文誌
巻 55,
号 2,
発行日 2014-02-15
|
ISSN |
|
|
収録物識別子タイプ |
ISSN |
|
収録物識別子 |
1882-7764 |