Search For:

Displaying 1-4 out of 4 total
Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults
Found in: Fault Diagnosis and Tolerance in Cryptography, Workshop on
By Chong Hee Kim
Issue Date:August 2010
pp. 3-9
The naive implementation of AES is known to be vulnerable to Differential Fault Analysis (DFA). We can findthe key of AES-128 (AES with 128-bit key) with one pair of correct and faulty cipher texts. Recently several works on the extension of the attack to ...
 
Faults, Injection Methods, and Fault Attacks
Found in: IEEE Design and Test of Computers
By Chong Hee Kim, Jean-Jacques Quisquater
Issue Date:November 2007
pp. 544-545
In a fault attack, errors are induced during the computation of a cryptographic algorithm, and the faulty results are exploited to extract information about the secret key in embedded systems. Fault attacks can break an unprotected system more quickly than...
 
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
Found in: Fault Diagnosis and Tolerance in Cryptography, Workshop on
By Chong Hee Kim, Jean-Jacques Quisquater
Issue Date:September 2007
pp. 21-29
RSA cryptosystem is one of the most widely used algorithms nowadays. However when it is implemented in embedded devices such as smart cards, it can be vulnerable to power analysis attacks and fault attacks. To defeat all known side channel attacks and faul...
 
Mutual Distance Bounding Protocols
Found in: IEEE Transactions on Mobile Computing
By Gildas Avoine,Chong Hee Kim
Issue Date:May 2013
pp. 830-839
A distance bounding protocol enables one entity to determine an upper bound on the physical distance to the other entity as well as to authenticate the other entity. It has been actively researched during the recent years as distance-based attacks like Maf...
 
 1