首页> 外文期刊>Quality and Reliability Engineering International >protection of keys against modification attack
【24h】

protection of keys against modification attack

机译:保护密钥免受修改攻击

获取原文
获取原文并翻译 | 示例
       

摘要

In 1997, Anderson and Kuhn described an attack against tamper-resistant devices wherein a secret key stored in EEPROM is compromised using a simple and low-cost attack. The attack consists of setting bits in the EEPROM Using low-cost probes and observing the effect on the output of the device. These attacks are extremely general, as They apply to virtually and cryptosystem. The objective of the present work is to explore cryptographic techniques With the goal of raising the cost (in terms of time and money) of carrying out the EEPROM modification attack by Class I attackers, at least to a point where it is as prohibitive as the cost of purchasing more expensive equipment.
机译:1997年,安德森(Anderson)和库恩(Kuhn)描述了针对防篡改设备的攻击,其中使用简单且低成本的攻击来破坏存储在EEPROM中的秘密密钥。攻击包括使用低成本探针设置EEPROM中的位并观察对器件输出的影响。这些攻击非常普遍,因为它们适用于虚拟系统和密码系统。当前工作的目的是探索密码技术,目的是提高一级攻击者进行EEPROM修改攻击的成本(在时间和金钱上),至少要达到与加密攻击一样禁止的程度。购买更昂贵的设备的成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号