Strengthening hardware AES implementations against fault attacks
- 1 January 2007
- journal article
- Published by Institution of Engineering and Technology (IET) in IET Information Security
- Vol. 1 (3), 106-110
- https://doi.org/10.1049/iet-ifs:20060163
Abstract
Differential fault attacks become a threat of increasing importance against cryptographic devices. One of the most efficient hardware countermeasures for block ciphers to prevent such attacks relies on duplication. Novel techniques to implement a duplication scheme for the AES are proposed. Remarkably, the proposed techniques do not impact on the throughput/area ratio and better withstand a large variety of known fault attacks.Keywords
This publication has 12 references indexed in Scilit:
- DFA on AESLecture Notes in Computer Science, 2005
- A Survey on Fault AttacksPublished by Springer Science and Business Media LLC ,2004
- Differential Fault Analysis on AES Key Schedule and Some CountermeasuresLecture Notes in Computer Science, 2003
- Hardware Fault Attack on RSA with CRT RevisitedLecture Notes in Computer Science, 2003
- Optical Fault Induction AttacksLecture Notes in Computer Science, 2003
- A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KhazadLecture Notes in Computer Science, 2003
- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)Lecture Notes in Computer Science, 2003
- The Design of RijndaelPublished by Springer Science and Business Media LLC ,2002
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997