A new zero value attack combined fault sensitivity analysis on masked AES

Qian Wang, An Wang*, Liji Wu, Jiliang Zhang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

4 引用 (Scopus)

摘要

Recently, a new kind of fault-based attacks called fault sensitivity analysis (FSA) has been proposed, which has significant advantage over the traditional Differential Fault Attacks (DFA). However, the masking countermeasure could resist original FSA attack. In this paper, we first find the zero value sensitivity model in masked AES, and propose a new FSA method combined with zero value attack, which could break the masked AES S-box. To further verify our zero value method, successful attack experiments were conducted on a masked AES implemented in hardware. Experimental results and comparisons confirm that the zero value attack method is more efficient than other FSA methods because of retrieving the secret key by set up the experiment once with only one clock frequency. Moreover, the offline calculation of our zero value method is saved by eliminating the correlation coefficient calculations, and the 28 times searches in key guess process are also omitted in our method.

源语言英语
页(从-至)355-362
页数8
期刊Microprocessors and Microsystems
45
DOI
出版状态已出版 - 1 9月 2016
已对外发布

指纹

探究 'A new zero value attack combined fault sensitivity analysis on masked AES' 的科研主题。它们共同构成独一无二的指纹。

引用此