【24h】

Differential Fault Analysis

机译:差分故障分析

获取原文

摘要

Commercial ventures and financial institutions have proposed and are relying upon smartcards and other security processors as a method for storing and transacting electronic currency. As users begin to accept electronic wallets as a viable option for storing their assets, the security community has placed these devices under closer scrutiny. The idea of using computational faults to break tamper resistant cryptographic devices has been recently highlighted in lot of researches. Biham and Shamir named this form of attack as Differential Fault Analysis (DFA). This paper summarizes the existing research on DFA, describes and analyzes a differential attack on various algorithms like DES, RSA, IDEA, RC5, DSA and other vulnerable ciphers. This paper also discusses some of the ways to prevent the Differential Fault Analysis.
机译:已提出商业企业和金融机构,并依赖于智能卡和其他安全处理器作为存储和交易电子货币的方法。随着用户开始接受电子钱包作为存储其资产的可行选择,安全社区将这些设备放置在仔细审查下。最近在大量研究中突出了使用计算故障来破坏防篡改加密设备的想法。 Biham和Shamir将这种形式的攻击命名为差异故障分析(DFA)。本文总结了对DFA的现有研究,描述并分析了DES,RSA,IDEA,RC5,DSA和其他易受攻击的密码等各种算法的差异攻击。本文还讨论了一些防止差分故障分析的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号