首页> 外文会议>Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), 2009 >Optical Fault Attacks on AES: A Threat in Violet
【24h】

Optical Fault Attacks on AES: A Threat in Violet

机译:对AES的光学故障攻击:紫罗兰色的威胁

获取原文
获取外文期刊封面目录资料

摘要

Microprocessors are the heart of the devices we rely on every day. However, their non-volatile memory, which often contains sensitive information, can be manipulated by ultraviolet (UV) irradiation. This paper gives practical results demonstrating that the non-volatile memory can be erased with UV light by investigating the effects of UV-Clight with a wavelength of 254 nm on four different depackaged microcontrollers. We demonstrate that an adversary can use this effect to attack an AES software implementation by manipulating the 256- bit S-box table. We show that if only a single byte of the table is changed, 2 500 pairs of correct and faulty encrypted inputs are sufficient to recover the key with a probability of 90%, in case the key schedule is not modified by the attack. Furthermore, we emphasize this by presenting a practical attack on an AES implementation running on an 8-bit microcontroller. Our attack involves only a standard decapsulation procedure and the use of alow-cost UV lamp.
机译:微处理器是我们每天依赖的设备的心脏。但是,它们的非易失性存储器通常包含敏感信息,可以通过紫外线(UV)进行操作。本文给出了实际结果,证明了通过研究254种波长的UV-Clight对四种不同的拆装微控制器的影响,可以用UV光擦除非易失性存储器。我们证明了对手可以通过操纵256位S-box表来利用这种效应来攻击AES软件实现。我们表明,如果仅更改表的单个字节,则在攻击未修改密钥调度的情况下,如果有2 500对正确和错误的加密输入就足以以90%的概率恢复密钥。此外,我们通过对在8位微控制器上运行的AES实现提出实际的攻击来强调这一点。我们的攻击仅涉及标准的拆封程序和使用低成本的紫外线灯。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号