Download now Free registration required
In this paper, the authors present a theoretical analysis of the limits of the Differential Fault Analysis (DFA) of AES by developing an interrelationship between conventional cryptanalysis of AES and DFAs. They show that the existing attacks have not reached these limits and present techniques to reach these. More specifically, they propose optimal DFA on states of AES-128 and AES-256. They also propose attacks on the key schedule of the three versions of AES, and demonstrate that these are some of the most efficient attacks on AES to date. Their attack on AES- 128 key schedule is optimal, and the attacks on AES-192 and AES-256 key schedule are very close to optimal.
- Format: PDF
- Size: 493 KB