Applying TVLA to Public Key Cryptographic Algorithms

نویسندگان

  • Michael Tunstall
  • Gilbert Goodwill
چکیده

Test Vector Leakage Assessment (TVLA) has been proposed as a method of determining if a side-channel attack is feasible, for a given implementation of a block cipher, by looking for leakage without conducting an attack. The thresholds chosen for the evaluation of leakage are chosen such that passing the tests gives a strong indication that no leakage is present. In this document, we describe how TVLA can be adapted to pubic key cryptographic algorithms, with a specific focus on RSA, ECDSA and ECDH.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

Analyzing the speed of combined cryptographic algorithms with secret and public key

Secure messages and key management have been a focal point in cryptography. In the cryptographic systems, the notion of key is referred ti an numerical value which is used by an algorithm, making the information secure and visible only to individuals that possess the proper key to discover that information. In this article we will explain the concepts of private key and public key cryptography,...

متن کامل

Post-quantum algorithms for digital signing in Public Key Infrastructures

One emerging threat to Public Key Infrastructures is the possible development of largescale quantum computers, which would be able to break the public-key cryptosystems used today. Several possibly post-quantum secure cryptographic algorithms have been proposed but so far they have not been used in many practical settings. The purpose of this thesis was to find post-quantum digital signature al...

متن کامل

Efficient and Secure Network Routing Algorithms

We present several algorithms for network routing that are resilient to various attacks on the routers themselves. Our methods for securing routing algorithms are based on a novel “leapfrog” cryptographic signing protocol, which is more efficient than using traditional public-key signature schemes.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016