Published July 18, 2018 | Version v1
Dataset Open

Supporting Material to "SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography"

  • 1. Graz University of Technology
  • 2. Infineon Technologies AG
  • 1. Graz University of Technology
  • 2. Infineon Technologies AG

Description

Supplementary material to the paper "SIFA: Exploiting Ineffective Fault Inductions on Symmetric Cryptography" by Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, and Robert Primas (CHES 2018, https://eprint.iacr.org/2018/071).

 

Ineffectively faulted AES Ciphertexts for different platforms and with different fault countermeasures in place (including infection-based configurations). Files:

  • */ct_correct.txt: AES ciphertexts where a fault was induced during the encryption, but did not change the ciphertext (decimal, CSV, 1 row per ciphertext)
  • */round_keys.txt: 11 expanded AES round keys used for all ciphertexts (decimal, CSV, 1 row per round key)
  • */sei_hardware.dat: Results of the statistical key-recovery evaluation. Row i lists the SEI of the right key, the SEI of the best wrong key, and the rank of the correct key after using 4*i of the ciphertexts in ct_correct.txt.

Target platforms and setups are described in more detail in the paper.

Files

sifa_results.zip

Files (1.4 MB)

Name Size Download all
md5:1f1c219498c111cb32593649b90aaacd
1.4 MB Preview Download

Additional details

Related works

Is supplement to
https://eprint.iacr.org/2018/071 (URL)

Funding

HECTOR – HARDWARE ENABLED CRYPTO AND RANDOMNESS 644052
European Commission