نتایج جستجو برای: side channel attack

تعداد نتایج: 499991  

Journal: :Journal of Ambient Intelligence and Humanized Computing 2020

Journal: :IACR transactions on cryptographic hardware and embedded systems 2022

In this paper, we propose the first key-recovery side-channel attack on Classic McEliece, a KEM finalist in NIST Post-quantum Cryptography Standardization Project. Our novel idea is to design an algorithm where submit special ciphertexts decryption oracle that correspond cases of single errors. Decoding such involves only entry large secret permutation, which part key. Through identified leakag...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2021

Deep learning (DL)-based techniques have recently proven to be very successful when applied profiled side-channel attacks (SCA). In a real-world SCA scenario, attackers gain knowledge about the target device by getting access similar prior attack. However, most state-of-the-art literature performs only proof-of-concept attacks, where traces intended for profiling and attacking are acquired cons...

2014
TIANWEI ZHANG

Side-channel attacks try to break a system’s confidentiality using physical information emitted from the targeted system. Such information is leaked out through cache side channels, which can exist in many parts of the system. Cache memories are a potential source of information leakage through side-channel attacks, many of which have been proposed. Meanwhile, different cache architectures have...

Journal: :Int. Arab J. Inf. Technol. 2016
Amuthan Arjunan Praveena Narayanan Kaviarasan Ramu

Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis i...

Journal: :IACR Cryptology ePrint Archive 2007
Christophe Petit François-Xavier Standaert Olivier Pereira Tal Malkin Moti Yung

We study the security of a block cipher-based pseudorandom number generator, both in the black box world and in the physical world, separately. We first show that the construction is a secure PRNG in the ideal cipher model. Then, we demonstrate its security against a Bayesian side-channel key recovery adversary. As a main result, we show that our construction guarantees that the success rate of...

Journal: :IACR Cryptology ePrint Archive 2004
Helmut Kahl

This note describes an SPA-based side channel attack against a CRT implementation of an RSA function. In contrast with Novak’s attack [8], it concentrates on the initial modular reduction. With the help of lattice reduction it applies even to implementations which use a common randomising technique to ensure resistance against certain side channel attacks.

2008
Pascal Delaunay Antoine Joux

We present a new side-channel attack against VEST, a set of four stream ciphers which reached the second phase of the eSTREAM project (the European stream cipher project). The proposed attacks target the counter part of the ciphers, composed of 16 short-length nonlinear feedback shift registers (NLFSR) independently updated. Our aim is to retrieve the whole initial state of the counter (163 to ...

Journal: :IACR Cryptology ePrint Archive 2015
Baris Ege Thomas Eisenbarth Lejla Batina

Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar while not identical leakage. We show how s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید