Improving DFA on AES using all-fault ciphertexts

Ni Yewen,Cui Xiaoxin,Wang Tian,Fan Yuanning,Han Qiankun,Liu Kefei,Cui Xiaole
DOI: https://doi.org/10.1109/ASICON.2017.8252468
2017-01-01
Abstract:The traditional random multi-byte fault model in AES fault attack only uses the faulty ciphertexts with diagonal-fault distributions to implement differential fault analysis. When there are not enough exploitable faulty ciphertexts, the round key could not be confirmed directly, and a comparatively large search space is still left for brute-force attack. In this paper, an improved differential fault analysis (DFA) using all-fault ciphertexts on AES was proposed. The all-fault ciphertexts could be used to optimize the selection of the brute-force space, which is helpful to recover the secret key quickly and improves the analysis efficiency. The experiment result demonstrated that by applying the DFA with all-fault ciphertexts, the time consumed on the brute-force attack can be reduced 60.81% on average, which significantly accelerated the process of cracking AES.
What problem does this paper attempt to address?