Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (4): 192-199.doi: 10.19665/j.issn1001-2400.2021.04.025

• Computer Science and Technology & Cyberspace Security • Previous Articles     Next Articles

Correlation fault attack on AES

WANG Xingxin(),HU Wei(),TAN Jing(),ZHU Jiacheng(),TANG Shibo()   

  1. School of Cybersecurity,Northwestern Polytechnical University,Xi’an 710072,China
  • Received:2020-03-16 Online:2021-08-30 Published:2021-08-31
  • Contact: Wei HU E-mail:w2x@mail.nwpu.edu.cn;weihu@nwpu.edu.cn;tanjing@mail.nwpu.edu.cn;zhu_jc@mail.nwpu.edu.cn;tangshibo@mail.nwpu.edu.cn

Abstract:

Fault injection attack is an effective cryptanalysis method.However,most existing fault injection attacks have strict restrictions on the location,time and number of faults injected,require complicated mathematical derivation during the key recovery process or need a huge amount of time to train fault attack templates.This paper proposes a comprehensive correlation fault injection attack on AES implementations of different key lengths,leveraging the correlation in the fault effect propagation in AES to recover the key.Our attack method uses a more flexible fault model in terms of the location and number of fault injections while only requiring simple correlation analysis to recover the key.Experimental results using AES implementations of variable key sizes show that random faults injected at any position before the mix-columns operation in the-2 round will allow successful recovery of the last round key through correlation analysis of the fault effects at the inputs of the S-Box in the final round.Additional random faults injected at any position before the mix-columns operation in the-3 round will allow the recovery of the round key before the final round.The key search complexity of the proposed method is 216.Two correct and faulty ciphertext pairs or four faulty ciphertexts under the same plaintext are sufficient to recover the original key of AES-128 and four correct and faulty ciphertext pairs or eight faulty ciphertexts under the same plaintext are sufficient to recover the original key of AES-192 and AES-256.

Key words: side channel analysis, fault injection attack, correlation fault analysis, advanced encryption standard

CLC Number: 

  • TP309