Defend encryption systems against side- channel attacks

نویسنده

  • Pankaj Rohatgi
چکیده

From its ancient origin as a tool for protecting sensitive wartime or espionage-related messages, cryptography has become a foundational building-block for securing the systems, protocols, and infrastructure that underpin our modern interconnected world. But the physical mechanisms used in performing encryption and decryption can leak information, making it possible to bypass this security. Protecting designs against such side-channel attacks starts with understanding how such attacks operate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elimination of Side Channel attacks on a Precision Timed Architecture

Side-channel attacks exploit information-leaky implementations of cryptographic algorithms to find the encryption key. These information leaks are caused by the underlying execution platform which contain hardware elements designed to optimize performance at the expense of predictable execution time. This shows that for security systems, not only does the software need to be secure, but the exe...

متن کامل

Announcing the Final Examination of Jingfei Kong for the degree of Doctor of Philosophy Time & Location: June 18, 2010 at 2:00 PM in HEC 302 Title: ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY

We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as cost efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes ...

متن کامل

Announcing the Final Examination of Jingfei Kong for the degree of Doctor of Philosophy Time & Location: June 18, 2010 at 2:00 PM in HEC 302 Title: ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY

We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as cost efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes ...

متن کامل

Announcing the Final Examination of Jingfei Kong for the degree of Doctor of Philosophy Time & Location: June 18, 2010 at 2:00 PM in HEC 302 Title: ARCHITECTURAL SUPPORT FOR IMPROVING COMPUTER SECURITY

We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as cost efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes ...

متن کامل

A dynamic study with side channel against An Identification Based Encryption

Recently, the side channel keeps the attention of researchers in theory of pairing, since, several studies have been done in this subject and all they have the aim in order to attack the cryptosystems of Identification Based Encryption (IBE) which are integrated into Smart Cards (more than 80% of those cryptosystems are based on a pairing). The great success and the remarkable development of th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017