Cold Boot Attacks on LUOV

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cold Boot Attacks on NTRU

Cold boot attacks target memory remanence effects in hardware to secret key material. Such attacks were first explored in the scientific literature by Halderman et al. (USENIX Security Symposium 2008) and, since then, different attacks have been developed against a range of asymmetric key and symmetric key algorithms. Such attacks in general receive as input a noisy version of the secret key as...

متن کامل

Cold Boot Attacks in the Discrete Logarithm Setting

In a cold boot attack a cryptosystem is compromised by analysing a noisy version of its internal state. For instance, if a computer is rebooted the memory contents are rarely fully reset; instead, after the reboot an adversary might recover a noisy image of the old memory contents and use it as a stepping stone for reconstructing secret keys. While such attacks were known for a long time, they ...

متن کامل

Improved RSA Private Key Reconstruction for Cold Boot Attacks

We give an algorithm that reconstructs an RSA private key given a 27% fraction of its bits at random. We make new observations about the structure of RSA keys that allow our algorithm to make use of the redundant information typically stored in an RSA private key. We give a rigorous analysis of the running time behavior of our algorithm that closely matches the sharp threshold phenomenon observ...

متن کامل

Hidden in snow, revealed in thaw: Cold boot attacks revisited

In this paper, we will provide an overview of the current state-of-theart with regards to so-called cold boot attacks, their practical applicability and feasibility, potential counter-measures and their effectiveness.

متن کامل

A flexible framework for mobile device forensics based on cold boot attacks

Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits the remanence effect that causes data in DRAM modules not to lose the content immediately in case...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Sciences

سال: 2020

ISSN: 2076-3417

DOI: 10.3390/app10124106