Protecting cryptographic integrated circuits with side-channel information
نویسندگان
چکیده
منابع مشابه
Physical side-channel attacks on cryptographic systems
We survey a number of attacks on cryptographic systems which depend on measuring physical characteristics of such systems whilst a given cryptographic operation is carried out. Such measurements could include the time needed to perform certain operations, the power consumed or any electromagnetic radiation produced. As such the physical measurement is producing a side-channel for the cryptograp...
متن کاملWiretap Channel With Side Information
The wiretap channel put forward by Wyner for many years. In this paper, we consider the situation that the wiretapper can not only view the channel output via a second noisy channel, but also can get some side information about the codeword that transmitted in the main noisy channel. The designer tries to build the encoder-decoder in such a way as to maximize the transmission rate R, and the eq...
متن کاملNew Cryptographic Protocols With Side-Channel Attack Security
Acknowledgments This thesis is based on joint work with Professor Mihir Bellare and David Cash. I'd like to express gratitude for the time that we explored ideas together; you were wonderful to work with! A very special thank you to my Advisor, Professor Shafi Goldwasser, for such caring mentorship – it has been such a pleasure to work and to learn under you for my time at MIT. Finally, I'd lik...
متن کاملSide-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
As most modern cryptographic Radio Frequency Identification (RFID) devices are based on ciphers that are secure from a purely theoretical point of view, e.g., (Triple-)DES or AES, adversaries have been adopting new methods to extract secret information and cryptographic keys from contactless smartcards: Side-Channel Analysis (SCA) targets the physical implementation of a cipher and allows to re...
متن کاملA unified formalism for side-channel and fault attacks on cryptographic circuits
Security is a key component for information technologies and communication. Security is a very large research area involved in the whole information technology, related to both hardware and software. This paper focuses on hardware security, and more specifically on hardware cryptanalysis whose aim is to extract confidential information (such as encryption keys) from cryptographic circuits. Many...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Electronics Express
سال: 2017
ISSN: 1349-2543
DOI: 10.1587/elex.14.20162005