A Differential Fault Attack Against Early Rounds of (Triple-)DES

作者: Ludger Hemme

DOI: 10.1007/978-3-540-28632-5_19

关键词:

摘要: Previously proposed differential fault analysis (DFA) techniques against iterated block ciphers mostly exploit computational errors in the last few rounds of cipher to extract secret key. In this paper we describe a DFA attack that exploits early Feistel cipher. The principle is force collisions by inducing faults intermediate results We put into practice DES implemented on smart card and extracted full round key first within hours one bit second third round, respectively.

参考文章(9)
Mitsuru Matsui, On correlation between the order of S-boxes and the strength of DES theory and application of cryptographic techniques. pp. 366- 375 ,(1994) , 10.1007/BFB0053451
Eli Biham, Adi Shamir, Differential cryptanalysis of DES-like cryptosystems international cryptology conference. ,vol. 4, pp. 2- 21 ,(1990) , 10.1007/BF00630563
Gilles Piret, Jean-Jacques Quisquater, A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD cryptographic hardware and embedded systems. ,vol. 2779, pp. 77- 88 ,(2003) , 10.1007/978-3-540-45238-6_7
Pierre Dusart, Gilles Letourneux, Olivier Vivolo, Differential Fault Analysis on A.E.S applied cryptography and network security. pp. 293- 306 ,(2003) , 10.1007/978-3-540-45203-4_23
Sergei P. Skorobogatov, Ross J. Anderson, Optical Fault Induction Attacks cryptographic hardware and embedded systems. pp. 2- 12 ,(2002) , 10.1007/3-540-36400-5_2
M. Kuhn, R. Anderson, Low cost attacks on tamper resistant devices Lecture Notes in Computer Science. pp. 125- 136 ,(1998)
E. Biham, A. Shamir, Differential fault analysis of secret key cryptosystems Lecture Notes in Computer Science. pp. 513- 525 ,(1997)
Ross Anderson, Markus Kuhn, Low Cost Attacks on Tamper Resistant Devices international workshop on security. pp. 125- 136 ,(1997) , 10.1007/BFB0028165
Eli Biham, Adi Shamir, Differential Fault Analysis of Secret Key Cryptosystems international cryptology conference. pp. 513- 525 ,(1997) , 10.1007/BFB0052259