A Fault-based Attack on AEZ v4.2

TrustCom 2017
Pages: 634 - 641
Published: Aug 1, 2017
Abstract
This paper investigates differential fault attacks against AEZ v4.2 authenticated encryption scheme. AEZ uses three different 128-bit keys (I, J, L) and can potentially work without a nonce or with a repeated nonce. Under these conditions, this paper identifies the best place to apply differential fault attacks. We exploit the structure of AEZ to minimise the total number of faults required for key recovery. We propose an approach that can...
Paper Details
Title
A Fault-based Attack on AEZ v4.2
Published Date
Aug 1, 2017
Journal
Pages
634 - 641
Citation AnalysisPro
  • Scinapse’s Top 10 Citation Journals & Affiliations graph reveals the quality and authenticity of citations received by a paper.
  • Discover whether citations have been inflated due to self-citations, or if citations include institutional bias.