Electromagnetic glitch on the AES round counter - Mines Saint-Étienne Access content directly
Conference Papers Year : 2013

Electromagnetic glitch on the AES round counter

Abstract

This article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (AES) algorithm. The round keys are computed on-the-fly during each encryption. A non-invasive transient fault injection is achieved on the AES round counter. The attack is performed by injecting a very short electromagnetic glitch on a 32-bit microcontroller based on the arm Cortex-M3 processor. Using this experimental setup, we are able to disrupt the round counter increment at the end of the penultimate round and execute one additional round. This faulty execution enables us to recover the encryption key with only two pairs of corresponding correct and faulty ciphertexts.
Fichier principal
Vignette du fichier
COSADE_2013_HAL.pdf (559.36 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

emse-00837514 , version 1 (24-02-2014)

Identifiers

Cite

Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, Assia Tria. Electromagnetic glitch on the AES round counter. Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design - COSADE'2013, Mar 2013, Paris, France. pp 17-31, ⟨10.1007/978-3-642-40026-1⟩. ⟨emse-00837514⟩
429 View
1328 Download

Altmetric

Share

Gmail Mastodon Facebook X LinkedIn More