Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule - Archive ouverte HAL Accéder directement au contenu
Rapport (Rapport De Recherche) Année : 2015

Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule

Christophe Clavier
DMI
Julien Francq
  • Fonction : Auteur
  • PersonId : 938634
Antoine Wurcker
  • Fonction : Auteur
DMI

Résumé

In this paper we study a parity check based countermeasure proposed by Chen et al. that thwarts their attack by detecting byte fault injection during the AES key schedule process. We provide a generalization of their approach that allows to derive parity equations for every AES sizes not given by the authors. We analyze why Chen et al. countermeasure does not properly works. Doing so we are able to extend the coverage of the fault detection to the full expanded key. Finally we suggest optimizations that reduce memory and computation costs, and propose an adaptation to a more general fault model.
Fichier principal
Vignette du fichier
2015-877.pdf (378.49 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02486939 , version 1 (21-02-2020)

Identifiants

  • HAL Id : hal-02486939 , version 1

Citer

Christophe Clavier, Julien Francq, Antoine Wurcker. Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule. [Research Report] 2015/877, IACR Cryptology ePrint Archive. 2015. ⟨hal-02486939⟩
46 Consultations
75 Téléchargements

Partager

Gmail Facebook X LinkedIn More