作者: Ludger Hemme
DOI: 10.1007/978-3-540-28632-5_19
关键词:
摘要: Previously proposed differential fault analysis (DFA) techniques against iterated block ciphers mostly exploit computational errors in the last few rounds of cipher to extract secret key. In this paper we describe a DFA attack that exploits early Feistel cipher. The principle is force collisions by inducing faults intermediate results We put into practice DES implemented on smart card and extracted full round key first within hours one bit second third round, respectively.