The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL

Kazuo SAKIYAMA, Kazuo OHTA

  • Full Text Views

    0

  • Cite this

Summary :

As one of the logic-level countermeasures against DPA (Differential Power Analysis) attacks, Random Switching Logic (RSL) was proposed by Suzuki, Saeki and Ichikawa in 2004 . The RSL technique was applied to AES hardware and a prototype chip was implement with a 0.13-µm standard CMOS library for evaluating the DPA resistance . Although the main purpose of using RSL is to resist the DPA attacks, our experimental results of Clock-based Fault Analysis (CFA) show that one can reveal the secret information from the prototype chip. This paper explains the mechanism of the CFA attack and discusses the reason for the success of the attack against a prototype implementation of AES with RSL (RSL-AES). Furthermore, we consider an ideal RSL-AES implementation that counteracts the CFA attacks.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E93-A No.1 pp.172-179
Publication Date
2010/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E93.A.172
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Cryptanalysis

Authors

Keyword