Electromagnetic glitch on the AES round counter - Mines Saint-Étienne
Communication Dans Un Congrès Année : 2013

Electromagnetic glitch on the AES round counter

Résumé

This article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (AES) algorithm. The round keys are computed on-the-fly during each encryption. A non-invasive transient fault injection is achieved on the AES round counter. The attack is performed by injecting a very short electromagnetic glitch on a 32-bit microcontroller based on the arm Cortex-M3 processor. Using this experimental setup, we are able to disrupt the round counter increment at the end of the penultimate round and execute one additional round. This faulty execution enables us to recover the encryption key with only two pairs of corresponding correct and faulty ciphertexts.
Fichier principal
Vignette du fichier
COSADE_2013_HAL.pdf (559.36 Ko) Télécharger le fichier
Origine Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

emse-00837514 , version 1 (24-02-2014)

Identifiants

Citer

Amine Dehbaoui, Amir-Pasha Mirbaha, Nicolas Moro, Jean-Max Dutertre, Assia Tria. Electromagnetic glitch on the AES round counter. Fourth International Workshop on Constructive Side-Channel Analysis and Secure Design - COSADE'2013, Mar 2013, Paris, France. pp 17-31, ⟨10.1007/978-3-642-40026-1⟩. ⟨emse-00837514⟩
447 Consultations
1370 Téléchargements

Altmetric

Partager

More