Optical Fault Attacks on AES: A Threat in Violet
- 1 September 2009
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Microprocessors are the heart of the devices we rely on every day. However, their non-volatile memory, which often contains sensitive information, can be manipulated by ultraviolet (UV) irradiation. This paper gives practical results demonstrating that the non-volatile memory can be erased with UV light by investigating the effects of UV-Clight with a wavelength of 254 nm on four different depackaged microcontrollers. We demonstrate that an adversary can use this effect to attack an AES software implementation by manipulating the 256- bit S-box table. We show that if only a single byte of the table is changed, 2 500 pairs of correct and faulty encrypted inputs are sufficient to recover the key with a probability of 90%, in case the key schedule is not modified by the attack. Furthermore, we emphasize this by presenting a practical attack on an AES implementation running on an 8-bit microcontroller. Our attack involves only a standard decapsulation procedure and the use of alow-cost UV lamp.Keywords
This publication has 10 references indexed in Scilit:
- Fault Analysis Attack on an FPGA AES ImplementationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Practical Setup Time Violation Attacks on AESPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Robust Finite Field Arithmetic for Fault-Tolerant Public-Key CryptographyLecture Notes in Computer Science, 2006
- Fault Based Collision Attacks on AESLecture Notes in Computer Science, 2006
- DFA on AESLecture Notes in Computer Science, 2005
- Differential Fault Analysis on AES Key Schedule and Some CountermeasuresLecture Notes in Computer Science, 2003
- Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)Lecture Notes in Computer Science, 2003
- Differential Fault Analysis on A.E.SLecture Notes in Computer Science, 2003
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Differential fault analysis of secret key cryptosystemsLecture Notes in Computer Science, 1997