Skip to Main content Skip to Navigation
Conference papers

Electromagnetic glitch on the AES round counter

Abstract : This article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (AES) algorithm. The round keys are computed on-the-fly during each encryption. A non-invasive transient fault injection is achieved on the AES round counter. The attack is performed by injecting a very short electromagnetic glitch on a 32-bit microcontroller based on the arm Cortex-M3 processor. Using this experimental setup, we are able to disrupt the round counter increment at the end of the penultimate round and execute one additional round. This faulty execution enables us to recover the encryption key with only two pairs of corresponding correct and faulty ciphertexts.
Complete list of metadata

Cited literature [14 references]  Display  Hide  Download
Contributor : Nicolas Moro Connect in order to contact the contributor
Submitted on : Monday, February 24, 2014 - 2:29:04 PM
Last modification on : Wednesday, June 24, 2020 - 4:18:19 PM
Long-term archiving on: : Saturday, May 24, 2014 - 10:36:28 AM


Files produced by the author(s)



Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, Assia Tria. Electromagnetic glitch on the AES round counter. Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design - COSADE'2013, Mar 2013, Paris, France. pp 17-31, ⟨10.1007/978-3-642-40026-1⟩. ⟨emse-00837514⟩



Record views


Files downloads