【24h】

Fault Injection and a Timing Channel on an Analysis Technique

机译:故障注入和定时通道的一种分析技术

获取原文
获取原文并翻译 | 示例

摘要

Attacks on cryptosystem implementations (e.g. security fault injection, timing analysis and differential power analysis) are amongst the most exciting developments in cryptanalysis of the past decade. Altering the internal state of a cryptosystem or profiling the system's computational dynamics can be used to gain a huge amount of information. This paper shows how fault injection and timing analysis can be interpreted for a simulated annealing attack on Pointcheval's Permuted Perceptron Problem (PPP) identification schemes. The work is unusual in that it concerns fault injection and timing analysis on an analysis technique. All recommended sizes of the PPP schemes are shown to be unsafe.
机译:在过去的十年中,对密码系统实现的攻击(例如安全性故障注入,时序分析和差分功率分析)是最令人兴奋的发展之一。更改密码系统的内部状态或分析系统的计算动态可用于获取大量信息。本文展示了如何针对Pointcheval的置换感知器问题(PPP)识别方案的模拟退火攻击解释故障注入和时序分析。这项工作是不寻常的,因为它涉及故障注入和基于分析技术的时序分析。所有建议的PPP方案大小均显示为不安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号