Abstract

Differential Fault Analysis (DFA) is a kind of fault injection attack on block ciphers. To retrieve the master secret key embedded in hardware device, an attacker should obtain some faulty outputs that occur after a fault injection during the operation of a cryptographic algorithm. This paper proposes an improved DFA on the block cipher ARIA. To retrieve the 128-bit full secret key of ARIA, 33 faulty ciphertexts are sufficient for the proposed DFA. Our proposal is more efficient than the previous DFA introduced by W. Li et al., which requires about 45 faulty ciphertexts. And, the experimental results on the commercial microcontroller ATmega128 give the validity and effectiveness for our DFA.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call