Cryptography Reference
In-Depth Information
Table 4.4
Number of faulty ciphertexts required to successfully mount a DFA attack on AES-128 depending on the impact and the location of the faults
Ref.
Fault impact
Fault location
Number of faulty
Number of
ciphertexts
candidates left
[
426
]
Bit flip
Random on a chosen temporary variable (input of round 10)
32
1
[
55
]
Bit stuck at 0
Chosen (after the first round key addition)
128
1
Chosen ( K 9 , K 8
and M 8 )
2 16
[
160
]
Uniformly distributed random byte
31
Random on a chosen temporary variable ( K 9 , K 8
and M 8 )
2 16
248
[
127
]
Uniformly distributed random byte
Random between MixColumns of rounds 8 and 9
50
1
Chosen ( K 9
and K 8 )
2 24
[
84
]
Uniformly distributed random byte
22
2 40
[
324
]
Random byte
Random between MixColumns of rounds 7 and 8
1
2
1
[
323
]
Uniformly distributed random byte
Fixed between MixColumns of rounds 6 and 7
255
1
[
51
]
Bit flip
Chosen
32
1
Random on a chosen byte
4,096
1
[
296
]
At most three bytes per column
Random on a chosen temporary variable (input of MC of round 9)
6
1
Each and every byte
Random on a chosen temporary variable (input of MC of round 9)
1,495
1
Chosen ( K 9 )
[
322
]
Uniformly distributed random word
12
1
Random on a chosen temporary variable ( K 8 )
2 40
[
392
]
Random word (column)
2
2 16
4
Chosen ( K 9 )
2 32
[ 229 ]
Three random bytes
2
4
1
2 40
[ 148 ]
Random byte
Random on a chosen temporary variable (input of round 8)
1
2
1
2 36
[ 229 ]
Random byte
Random on a chosen temporary variable (input of round 8)
1
2
1
2 12
[
]
403
Random byte
Random between MixColumns of rounds 7 and 8
1
2 34
[
352
]
Random word (diagonal)
Random between MixColumns of round 7 and ShiftRows of round 8
1
2
1
Three random words (three diagonals)
Random between MixColumns of round 7 and ShiftRows of round 8
4
1
 
Search WWH ::




Custom Search