Probing attacks on tamper-resistant devices

被引:0
|
作者
Handschuh, H [1 ]
Paillier, P
Stern, J
机构
[1] ENST, Gemplus, Toulouse, France
[2] Ecole Normale Super, F-75231 Paris, France
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibly a single one) during the execution of a cryptographic algorithm, typically by the mean of a probe (needle), an attacker could easily recover information on the secret key being used; our attacks apply to public-key cryptosystems such as RSA or El Gamal, as well as to secret-key encryption schemes including DES and RC5.
引用
收藏
页码:303 / 315
页数:13
相关论文
共 50 条
  • [1] TAMPER-RESISTANT BUT NOT IMPOSSIBLE
    MCLEARN, D
    [J]. AMERICAN JOURNAL OF NURSING, 1985, 85 (03) : 244 - +
  • [2] Tamper-resistant biometric IDs
    Kirovski, D
    Jojic, N
    Jancke, G
    [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 160 - 175
  • [3] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [4] TAMPER-RESISTANT PACKAGING - IS IT REALLY
    LOCKHART, HE
    RICHMOND, M
    SNEDEN, J
    [J]. PACKAGE ENGINEERING, 1983, 28 (07): : 96 - &
  • [5] Tamper-Resistant LikeJacking Protection
    Johns, Martin
    Lekies, Sebastian
    [J]. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 265 - 285
  • [6] Tamper-Resistant Code Using Optimal ROP Gadgets for IoT Devices
    Hota, Chittaranjan
    Shrivastava, Rajesh Kumar
    Shipra, Shivangi
    [J]. 2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 570 - 575
  • [7] Tamper-resistant whole program partitioning
    Zhang, T
    Pande, S
    Valverde, A
    [J]. ACM SIGPLAN NOTICES, 2003, 38 (07) : 209 - 219
  • [8] Tamper-resistant ubiquitous data management
    Bouganim, L
    Ngoc, FD
    Pucheral, P
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 147 - 158
  • [9] The Research of Website Tamper-resistant Technology
    Qi Tao
    Wang Bo
    Zhao Sujuan
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 475 - +
  • [10] License protection with a tamper-resistant token
    Chong, CN
    Ren, B
    Doumen, J
    Etalle, S
    Hartel, PH
    Corin, R
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 223 - 237