WEKO3
アイテム
Practical DFA Strategy for AES Under Limited-access Conditions
https://ipsj.ixsq.nii.ac.jp/records/100911
https://ipsj.ixsq.nii.ac.jp/records/100911e0f0a8d4-16d6-4f28-b00e-ccf92d707204
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2014 by the Information Processing Society of Japan
|
|
オープンアクセス |
Item type | JInfP(1) | |||||||
---|---|---|---|---|---|---|---|---|
公開日 | 2014-04-15 | |||||||
タイトル | ||||||||
タイトル | Practical DFA Strategy for AES Under Limited-access Conditions | |||||||
タイトル | ||||||||
言語 | en | |||||||
タイトル | Practical DFA Strategy for AES Under Limited-access Conditions | |||||||
言語 | ||||||||
言語 | eng | |||||||
キーワード | ||||||||
主題Scheme | Other | |||||||
主題 | [Special Issue on Embedded Systems Engineering] cryptography, advance encryption standard, differential fault analysis, intentional electromagnetic interference, uncertain faults. | |||||||
資源タイプ | ||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||
資源タイプ | journal article | |||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属 | ||||||||
Tohoku University | ||||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属 | ||||||||
Tohoku University | ||||||||
著者所属 | ||||||||
Tohoku University | ||||||||
著者所属 | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Tohoku University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Tohoku University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
Tohoku University | ||||||||
著者所属(英) | ||||||||
en | ||||||||
The University of Electro-Communications | ||||||||
著者名 |
Kazuo, Sakiyama
Yang, Li
Shigeto, Gomisawa
Yu-ichiHayashi
Mitsugu, Iwamoto
Naofumi, Homma
Takafumi, Aoki
Kazuo, Ohta
× Kazuo, Sakiyama Yang, Li Shigeto, Gomisawa Yu-ichiHayashi Mitsugu, Iwamoto Naofumi, Homma Takafumi, Aoki Kazuo, Ohta
|
|||||||
著者名(英) |
Kazuo, Sakiyama
Yang, Li
Shigeto, Gomisawa
Yu-ichi, Hayashi
Mitsugu, Iwamoto
Naofumi, Homma
Takafumi, Aoki
Kazuo, Ohta
× Kazuo, Sakiyama Yang, Li Shigeto, Gomisawa Yu-ichi, Hayashi Mitsugu, Iwamoto Naofumi, Homma Takafumi, Aoki Kazuo, Ohta
|
|||||||
論文抄録 | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections. | |||||||
論文抄録(英) | ||||||||
内容記述タイプ | Other | |||||||
内容記述 | Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections. | |||||||
書誌レコードID | ||||||||
収録物識別子タイプ | NCID | |||||||
収録物識別子 | AA00700121 | |||||||
書誌情報 |
Journal of information processing 巻 22, 号 2, p. 142-151, 発行日 2014-04-15 |
|||||||
ISSN | ||||||||
収録物識別子タイプ | ISSN | |||||||
収録物識別子 | 1882-6652 | |||||||
出版者 | ||||||||
言語 | ja | |||||||
出版者 | 情報処理学会 |