首页> 外文会议>Proceedings of the Seventh International Workshop on Fault Diagnosis and Tolerance in Cryptography >Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis
【24h】

Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis

机译:AES的被动和主动组合攻击,结合故障攻击和侧信道分析

获取原文

摘要

Tamper resistance of hardware products is currently a very popular subject for researchers in the security domain. Since the first Kocher side-channel (passive)attack, the Bellcore researchers and Biham and Shamir fault (active) attacks, many other side-channel and fault attacks have been published. The design of efficient countermeasures still remains a difficult task for IC designers and manufacturers as they must also consider the attacks which combine active and passive threats. It has been shown previously that combined attacks can defeat RSA implementations if side-channel countermeasures and fault protections are developed separately instead of being designed together. This paper demonstrates that combined attacks are also effective on symmetric cryptosystems and shows how they may jeopardize a supposedly state of the art secure AES implementation.
机译:对于安全领域的研究人员来说,硬件产品的防篡改目前是非常受欢迎的主题。自从第一次发生Kocher边道(被动)攻击,Bellcore研究人员以及Biham和Shamir断层(主动)攻击以来,已经发布了许多其他边道和断层攻击。对于IC设计人员和制造商来说,设计有效的对策仍然是一项艰巨的任务,因为他们还必须考虑将主动和被动威胁结合在一起的攻击。先前已经证明,如果单独开发侧信道对策和故障保护而不是一起设计,则组合攻击可能会破坏RSA实现。本文证明了组合攻击在对称密码系统上也有效,并展示了它们如何可能危害所谓的最先进的安全AES实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号