2015
DOI: 10.1007/978-981-287-787-1
|View full text |Cite
|
Sign up to set email alerts
|

Why Cryptography Should Not Rely on Physical Attack Complexity

Abstract: Ich versichere an Eides statt, dass ich diese Dissertation selbständig verfasst und nur die angegebenen Quellen und Hilfsmittel verwendet habe. Datum Für meine Eltern AbstractEver since the first side channel attacks and fault attacks on cryptographic devices were introduced in the mid-nineties, new possibilities of physical attacks have been consistently explored. The risk that these attacks pose is reduced by reacting to known attacks and by developing and implementing countermeasures against them. For phys… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…The symmetric algorithms exposed in this section were implemented, aiming to deliver some level of mathematical safety. However, both symmetric and asymmetric algorithms are known to be vulnerable to SCA even with high numerical robustness (i.e., higher bit-width encryption) [27].…”
Section: Symmetric Cryptography Algorithmsmentioning
confidence: 99%
“…The symmetric algorithms exposed in this section were implemented, aiming to deliver some level of mathematical safety. However, both symmetric and asymmetric algorithms are known to be vulnerable to SCA even with high numerical robustness (i.e., higher bit-width encryption) [27].…”
Section: Symmetric Cryptography Algorithmsmentioning
confidence: 99%
“…We call this the "good enough" approach to security. Others, especially the field of cryptography [102], follow the approach of "perfect security". Perfect security refers to using every possible mean to achieve security.…”
Section: Review Of Security Threats For Protocols and Servicesmentioning
confidence: 99%
“…Some microcontrollers even allow the execution of a program from the SRAM in order to fasten execution or minimize power consumption. In the context involving the manipulation of sensitive data such as encryption [1], this area becomes a target of choice for attackers.…”
Section: Introductionmentioning
confidence: 99%