Differential Behavioral Analysis
Abstract
This paper describes an attack on cryptographic devices called
Differential Behavioral Analysis (or DBA). This is an hybrid attack
between two already powerful attacks: differential power analysis
(DPA) for the statistical treatment and safe-error attack for the fault type.
DBA, simulated on an algorithmic model of AES appears to be very
efficient. The attacker is able to recover the entire secret key
with byte-wise \textquotedblleft stuck-at'' faults injected
repetitively. A theorical as well as a more realistic approach are
presented.
Origin | Files produced by the author(s) |
---|
Loading...