Download Now Free registration required
The authors present new combined attacks on the AES key schedule based on the work of Roche et al.. The main drawbacks of the original attack are: the need for high repeatability of the fault, a very particular fault model and a very high complexity of the key recovery algorithm. They consider more practical fault models, they obtain improved key recovery algorithms and they present more attack paths for combined attacks on AES. They propose to inject faults on the different operations of the key schedule instead of the key state of round 9 or the corresponding data state.
- Format: PDF
- Size: 357.76 KB