Autor: |
Richa Gupta, S. P. Maniraj, Aakanksha Thakur, Tadepalli Sarada Kiranmayee, M. Bhagyashree |
Rok vydání: |
2019 |
Předmět: |
|
Zdroj: |
Lecture Notes on Data Engineering and Communications Technologies ISBN: 9783030246426 |
DOI: |
10.1007/978-3-030-24643-3_26 |
Popis: |
It has been detected that the existing Differential Fault Analysis needs to modify the Advanced Encryption Standard for easy key retrieval process. The attack of DFA on the AES-128 requires a massive amount of faulty ciphertext pairs. Key retrieval using DFA attack on AES-128 requires minimal of 250 pairs of faulty cipher-text. This can be reduced to 14 to 16 pairs of faulty cipher-text samples in AES-192 bits and AES-256 bits. This was done by injecting faults randomly into the 11th cycle key which is saved in the Static RAM-Random Access Memory. Researches are made on methods for finding the initial key and that has only been suggested in AES-128. This paper puts forward a system which, intends to induce DFA attack on AES-192 and AES-256 algorithms with less number of faulty cipher-texts. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|