WEKO3
-
RootNode
アイテム
Practical DFA Strategy for AES Under Limited-access Conditions
https://ipsj.ixsq.nii.ac.jp/records/98524
https://ipsj.ixsq.nii.ac.jp/records/985248aba128c-7b26-4dd0-bb78-3d7f936ac1ae
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Copyright (c) 2014 by the Information Processing Society of Japan
|
|
非会員:¥660, IPSJ:学会員:¥330, 論文誌:会員:¥0, DLIB:会員:¥0 |
Item type | Journal(1) | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2014-02-15 | |||||||||||||||||||||
タイトル | ||||||||||||||||||||||
タイトル | Practical DFA Strategy for AES Under Limited-access Conditions | |||||||||||||||||||||
タイトル | ||||||||||||||||||||||
言語 | en | |||||||||||||||||||||
タイトル | Practical DFA Strategy for AES Under Limited-access Conditions | |||||||||||||||||||||
言語 | ||||||||||||||||||||||
言語 | eng | |||||||||||||||||||||
キーワード | ||||||||||||||||||||||
主題Scheme | Other | |||||||||||||||||||||
主題 | [特集:組込みシステム工学] cryptography, advance encryption standard, differential fault analysis, intentional electromagnetic interference, uncertain faults. | |||||||||||||||||||||
資源タイプ | ||||||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||||||
資源タイプ | journal article | |||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
Tohoku University | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
Tohoku University | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
Tohoku University | ||||||||||||||||||||||
著者所属 | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
Tohoku University | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
Tohoku University | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
Tohoku University | ||||||||||||||||||||||
著者所属(英) | ||||||||||||||||||||||
en | ||||||||||||||||||||||
The University of Electro-Communications | ||||||||||||||||||||||
著者名 |
Kazuo, Sakiyama
× Kazuo, Sakiyama
× Yang, Li
× Shigeto, Gomisawa
× Yu-ichiHayashi
× Mitsugu, Iwamoto
× Naofumi, Homma
× Takafumi, Aoki
× Kazuo, Ohta
|
|||||||||||||||||||||
著者名(英) |
Kazuo, Sakiyama
× Kazuo, Sakiyama
× Yang, Li
× Shigeto, Gomisawa
× Yu-ichi, Hayashi
× Mitsugu, Iwamoto
× Naofumi, Homma
× Takafumi, Aoki
× Kazuo, Ohta
|
|||||||||||||||||||||
論文抄録 | ||||||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||||||
内容記述 | Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online) DOI http://dx.doi.org/10.2197/ipsjjip.22.142 ------------------------------ |
|||||||||||||||||||||
論文抄録(英) | ||||||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||||||
内容記述 | Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections. ------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online) DOI http://dx.doi.org/10.2197/ipsjjip.22.142 ------------------------------ |
|||||||||||||||||||||
書誌レコードID | ||||||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||||||
収録物識別子 | AN00116647 | |||||||||||||||||||||
書誌情報 |
情報処理学会論文誌 巻 55, 号 2, 発行日 2014-02-15 |
|||||||||||||||||||||
ISSN | ||||||||||||||||||||||
収録物識別子タイプ | ISSN | |||||||||||||||||||||
収録物識別子 | 1882-7764 |
Share
Cite as
Kazuo, Sakiyama, Yang, Li, Shigeto, Gomisawa, Yu-ichiHayashi, Mitsugu, Iwamoto, Naofumi, Homma, Takafumi, Aoki, Kazuo, Ohta, 2014.
Loading...