首页> 外文会议>Computer security-ESORICS 2008 >Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
【24h】

Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks

机译:在未知消息攻击中正式限制侧通道泄漏

获取原文
获取原文并翻译 | 示例

摘要

We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret information that an attacker can extract from a system from a given number of side-channel measurements. We provide an algorithm to compute this measure, and we use it to analyze the resistance of hardware implementations of cryptographic algorithms with respect to timing attacks. In particular, we show that message-blinding - the common countermeasure against timing attacks - reduces the rate at which information about the secret is leaked, but that the complete information is still eventually revealed. Finally, we compare information measures corresponding to unknown-message, known-message, and chosen-message attackers and show that they form a strict hierarchy.
机译:我们提出了一种新颖的方法来量化系统对未知消息边信道攻击的抵抗力。该方法基于对攻击者可以从给定数量的边信道测量结果中从系统中提取的秘密信息的测量。我们提供了一种算法来计算此度量,并使用它来分析密码算法的硬件实现相对于定时攻击的抵抗力。特别是,我们显示出消息盲(一种针对定时攻击的常见对策)可降低泄露有关机密信息的速度,但最终仍会泄露完整的信息。最后,我们比较了与未知消息,已知消息和选择消息攻击者相对应的信息度量,并表明它们形成了严格的层次结构。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号