【24h】

Low Voltage Fault Attacks to AES

机译:低压故障攻击AES

获取原文

摘要

This paper presents a new fault based attack on the Advanced Encryption Standard (AES) with any key length, together with its practical validation through the use of low voltage induced faults. The CPU running the attacked algorithm is the ARM926EJ-S: a 32-bit processor widely deployed in computer peripherals, telecommunication appliances and low power portable devices. We prove the practical feasibility of this attack through inducing faults in the computation of the AES algorithm running on a full fledged Linux 2.6 operating system targeted to two implementations of the ARM926EJ-S on commercial development boards.
机译:本文介绍了基于新的故障基于高级加密标准(AES)的攻击,通过使用低压引起的故障以及其实际验证。运行攻击算法的CPU是ARM926EJ-S:广泛部署在计算机外围设备,电信设备和低功率便携式设备中的32位处理器。通过在商业开发板上的ARM926EJ-S的两种实现中,通过诱导攻击AES算法的AES算法计算中的故障来证明这次攻击的实际可行性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号