-
- YOSHIKAWA Hideki
- Faculty of Engineering, Tohoku Gakuin University
-
- KAMINAGA Masahiro
- Faculty of Engineering, Tohoku Gakuin University
-
- SHIKODA Arimitsu
- Faculty of Engineering, Tohoku Gakuin University
-
- SUZUKI Toshinori
- Faculty of Engineering, Tohoku Gakuin University
抄録
A method of round addition attack on substitution-permutation network (SPN) block ciphers using differential fault analysis (DFA) is presented. For the 128-bit advanced encryption standard (AES), we show that secret keys can be extracted using one correct ciphertext and two faulty ciphertexts. Furthermore, we evaluate the success rate of a round addition DFA attack, experimentally. The proposed method can also be applied to lightweight SPN block cipher such as KLEIN and LED.
収録刊行物
-
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
-
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E97.A (12), 2671-2674, 2014
一般社団法人 電子情報通信学会
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1390001206310429824
-
- NII論文ID
- 130004706439
-
- ISSN
- 17451337
- 09168508
-
- 本文言語コード
- en
-
- データソース種別
-
- JaLC
- Crossref
- CiNii Articles
-
- 抄録ライセンスフラグ
- 使用不可