Sciweavers

EDCC
2008
Springer

Practical Setup Time Violation Attacks on AES

14 years 2 months ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic systems have been discovered and researched [1]. However, to the authors' knowledge, all the attacks published so far use a theoretical model of faults. In this paper we prove that we are able to reproduce experimentally the random errors model used by G. Piret and J.J. Quisquater [11] to realize practical fault attack on a smart card embedding an AES encryptor by underpowering it. In spite of the fact that this method is a convenient fault injection technique to set up, it does not often appear in the open literature. We argue that the fault model is consistent with a setup violation: errors appear at the end of combinatorial logic cones, caused by an early sampling in the downwards registers. We also carry out an extensive characterization of the faults, in terms of spatial and temporal localization.
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
Added 19 Oct 2010
Updated 19 Oct 2010
Type Conference
Year 2008
Where EDCC
Authors Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
Comments (0)