Exploiting Cryptographic Architectures over Hardware Vs. Software Implementations: Advantages and Trade-Offs

نویسندگان

  • N. SKLAVOS
  • K. TOULIOU
چکیده

Cryptographic modules can be implemented in both hardware and software. Although software cryptographic implementations are cost-effective and more flexible, they seem to provide a much lower level of security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilities imposed by the OS and the facility of modifying software implementations are some of the security barriers of software cryptographic modules. This works deals with the exploitation of security architectures via software and hardware implementations. Especially it is centers in the advantages and the trade-offs of each one of the two alternatives integration approaches. Key-Words: Software/hardware cryptographic implementations, memory access, reverse-engineering, timing and power analysis attacks, OS vulnerabilities, random number generators, key storage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Codes for Fault Attack Resistant Cryptographic Hardware

Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. To detect these attacks we propose an architecture based on robust nonlinear systematic (n,k)-error-detecting codes. These nonlinear codes offer advantages over linear codes since they are capable of providing uniform error detecting coverage independently of the error distributions. They make no assu...

متن کامل

Security Implications of Hardware vs. Software Cryptographic Modules

Cryptographic modules can be implemented either by hardware or by software. Whereas software implementations are known for being easier to develop and to maintain, when it comes to cryptographic modules or security-related applications in general, software implementations are significantly less secure than their hardware equivalents. The reason for this is mostly the fact that software solution...

متن کامل

Stream ciphers and the eSTREAM project

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.

متن کامل

Destructive and constructive aspects of efficient algorithms and implementation of cryptographic hardware

In an ever-increasing digital world, the need for secure communications over unsecured channels like Internet has exploded. To meet the different security requirements, communication devices have to perform computationally-intensive cryptographic operations. Hardware processor or co-processor are therefore often needed to meet goals such as speed, ubiquity or cost-effectiveness. For such device...

متن کامل

FPGA Implementations of SHA-3 Candidates: CubeHash, Grøstl, LANE, Shabal and Spectral Hash

Hash functions are widely used in, and form an important part of many cryptographic protocols. Currently, a public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). Computational efficiency of the algorithms in hardware will form one of the evaluation criteria. In this paper, we focus on five of these candidate algorithms, namely Cub...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006