ログイン 新規登録
言語:

WEKO3

  • トップ
  • ランキング
To
lat lon distance
To

Field does not validate



インデックスリンク

インデックスツリー

メールアドレスを入力してください。

WEKO

One fine body…

WEKO

One fine body…

アイテム

  1. 論文誌(ジャーナル)
  2. Vol.55
  3. No.2

Practical DFA Strategy for AES Under Limited-access Conditions

https://ipsj.ixsq.nii.ac.jp/records/98524
https://ipsj.ixsq.nii.ac.jp/records/98524
8aba128c-7b26-4dd0-bb78-3d7f936ac1ae
名前 / ファイル ライセンス アクション
IPSJ-JNL5502048.pdf IPSJ-JNL5502048 (470.8 kB)
Copyright (c) 2014 by the Information Processing Society of Japan
非会員:¥660, IPSJ:学会員:¥330, 論文誌:会員:¥0, DLIB:会員:¥0
Item type Journal(1)
公開日 2014-02-15
タイトル
タイトル Practical DFA Strategy for AES Under Limited-access Conditions
タイトル
言語 en
タイトル Practical DFA Strategy for AES Under Limited-access Conditions
言語
言語 eng
キーワード
主題Scheme Other
主題 [特集:組込みシステム工学] cryptography, advance encryption standard, differential fault analysis, intentional electromagnetic interference, uncertain faults.
資源タイプ
資源タイプ識別子 http://purl.org/coar/resource_type/c_6501
資源タイプ journal article
著者所属
The University of Electro-Communications
著者所属
The University of Electro-Communications
著者所属
The University of Electro-Communications
著者所属
Tohoku University
著者所属
The University of Electro-Communications
著者所属
Tohoku University
著者所属
Tohoku University
著者所属
The University of Electro-Communications
著者所属(英)
en
The University of Electro-Communications
著者所属(英)
en
The University of Electro-Communications
著者所属(英)
en
The University of Electro-Communications
著者所属(英)
en
Tohoku University
著者所属(英)
en
The University of Electro-Communications
著者所属(英)
en
Tohoku University
著者所属(英)
en
Tohoku University
著者所属(英)
en
The University of Electro-Communications
著者名 Kazuo, Sakiyama

× Kazuo, Sakiyama

Kazuo, Sakiyama

Search repository
Yang, Li

× Yang, Li

Yang, Li

Search repository
Shigeto, Gomisawa

× Shigeto, Gomisawa

Shigeto, Gomisawa

Search repository
Yu-ichiHayashi

× Yu-ichiHayashi

Yu-ichiHayashi

Search repository
Mitsugu, Iwamoto

× Mitsugu, Iwamoto

Mitsugu, Iwamoto

Search repository
Naofumi, Homma

× Naofumi, Homma

Naofumi, Homma

Search repository
Takafumi, Aoki

× Takafumi, Aoki

Takafumi, Aoki

Search repository
Kazuo, Ohta

× Kazuo, Ohta

Kazuo, Ohta

Search repository
著者名(英) Kazuo, Sakiyama

× Kazuo, Sakiyama

en Kazuo, Sakiyama

Search repository
Yang, Li

× Yang, Li

en Yang, Li

Search repository
Shigeto, Gomisawa

× Shigeto, Gomisawa

en Shigeto, Gomisawa

Search repository
Yu-ichi, Hayashi

× Yu-ichi, Hayashi

en Yu-ichi, Hayashi

Search repository
Mitsugu, Iwamoto

× Mitsugu, Iwamoto

en Mitsugu, Iwamoto

Search repository
Naofumi, Homma

× Naofumi, Homma

en Naofumi, Homma

Search repository
Takafumi, Aoki

× Takafumi, Aoki

en Takafumi, Aoki

Search repository
Kazuo, Ohta

× Kazuo, Ohta

en Kazuo, Ohta

Search repository
論文抄録
内容記述タイプ Other
内容記述 Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.

------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)
DOI http://dx.doi.org/10.2197/ipsjjip.22.142
------------------------------
論文抄録(英)
内容記述タイプ Other
内容記述 Secret data in embedded devices can be revealed by injecting computational faults using the fault analysis attacks. The fault analysis researches on a cryptographic implementation by far first assumed a certain fault model, and then discussed the key recovery method under some assumptions. We note that a new remote-fault injection method has emerged, which is threatening in practice. Due to its limited accessibility to cryptographic devices, the remote-fault injection, however, can only inject uncertain faults. In this surroundings, this paper gives a general strategy of the remote-fault attack on the AES block cipher with a data set of faulty ciphertexts generated by uncertain faults. Our method effectively utilizes all the information from various kinds of faults, which is more realistic than previous researches. As a result, we show that it can provide a decent success probability of key identification even when only a few intended faults are available among 32 millions fault injections.

------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.22(2014) No.2 (online)
DOI http://dx.doi.org/10.2197/ipsjjip.22.142
------------------------------
書誌レコードID
収録物識別子タイプ NCID
収録物識別子 AN00116647
書誌情報 情報処理学会論文誌

巻 55, 号 2, 発行日 2014-02-15
ISSN
収録物識別子タイプ ISSN
収録物識別子 1882-7764
戻る
0
views
See details
Views

Versions

Ver.1 2025-01-20 06:47:05.613802
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Cite as

エクスポート

OAI-PMH
  • OAI-PMH JPCOAR
  • OAI-PMH DublinCore
  • OAI-PMH DDI
Other Formats
  • JSON
  • BIBTEX

Confirm


Powered by WEKO3


Powered by WEKO3