Cryptographic processors : applications and attacks survey
نویسنده
چکیده
The combination of cryptographic tools and tamper-resistant mechanisms appeared first in military applications to secure communication links using tamper-resistant cipher machines. The spread of ATM networks brought the technology into the commercial mainstream. During the last years, the use of embedded cryptographic processors has spread from low-cost cryptoprocessors, such as smart cards used for holding decryption keys, to more modern applications, such as electronic payement schemes, Digital Right Management and Trusted Computing Initiative (TCI). This survey, will summarize the main applications of the cryptographic processors and will insist on their use into PKI based systems. It will also address the main class of attacks which target the cryptographic processors.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملCryptographic Hash Functions: A Survey
This paper gives a survey on cryptographic hash functions. It gives an overview of all types of hash functions and reviews design principals and possible methods of attacks. It also focuses on keyed hash functions and provides the applications, requirements, and constructions of keyed hash functions.
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملSecurity of Sponge structures
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...
متن کاملArchitectural Analysis of Cryptographic Applications for Network Processors
Network processors are application specific programmable processors and will become critical components of next-generation networking equipment. As Internet expands exponentially, the need for secure communication increases very quickly. The performance of communication applications including packet processing and cryptographic applications on network processors thus becomes an important issue ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008