473,841 Hits in 5.8 sec

Lightweight Cryptography and DPA Countermeasures: A Survey [chapter]

Amir Moradi, Axel Poschmann
2010 Lecture Notes in Computer Science  
The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full control over the pervasive device, additionally  ...  to the cryptographic attacks the whole field of physical attacks has to be considered.  ...  Acknowledgment The research was supported in part by the Singapore National Research Foundation under Research Grant NRF-CRP2-2007-03.  ... 
doi:10.1007/978-3-642-14992-4_7 fatcat:cmm4odxtrjglhosmtpeoivltei

Analysis and Counter Measures of Various Attcks in Secure Network Protocols

Dr. V. Umadevi
2018 International Journal for Research in Applied Science and Engineering Technology  
In the greater part of the cases we incorporate exploratory outcomes showing the practicality of our assaults in reasonable system conditions.  ...  Our work demonstrates that the outline or usage of a few variations of these conventions are defenseless against assaults that come guarantee their key security highlights.  ...  The fundamental idea is taking advantage of timing variations. The idea was then translated into a real attack against a smart card-based implementation of RSA [3] .  ... 
doi:10.22214/ijraset.2018.7145 fatcat:sjbh4gzwvzemjokeu3e2uabjri

An overview of cryptanalysis research for the advanced encryption standard

Alan Kaminsky, Michael Kurdziel, Stanislaw Radziszowski
The paper is concluded with an attempt at a forecast of the usable life of AES in these applications.  ...  The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15).  ...  The period of vulnerability will be the time between the publication of a practical breakthrough and the completion of a replacement effort.  ... 
doi:10.1109/milcom.2010.5680130 fatcat:zlylkf7vnzfjzclw3atqshp6l4

Confidence in smart token proximity: Relay attacks revisited

G.P. Hancke, K.E. Mayes, K. Markantonakis
2009 Computers & security  
Finally, we evaluate the effectiveness of time-out constraints, distance bounding and the use of a additional verification techniques for making systems relay-resistant and explain the challenges still  ...  In this paper we discuss the feasibility of implementing passive and active relay attacks against smart tokens and the possible security implications if an attacker succeeds.  ...  Practical Implementation The theoretical principles of a relay attack is quite simple but the attacker must still overcome timing restrictions and the practical engineering challenges of relaying signals  ... 
doi:10.1016/j.cose.2009.06.001 fatcat:odt7t45qerhelmk3ph2qgthche

miTLS: Verifying Protocol Implementations against Real-World Attacks

Karthikeyan Bhargavan, Cedric Fournet, Markulf Kohlweiss
2016 IEEE Security and Privacy  
miTLS: a verified reference implementation of TLS By 2008, the theory and practice of TLS had largely diverged.  ...  Towards TLS 1.3 At the time when SSL was first designed, there was a real enthusiasm and sense of purpose to deploy practical cryptographic protocols.  ... 
doi:10.1109/msp.2016.123 fatcat:fisjry37bzexpdcl26l67e67p4

Side-Channel Leakage of Masked CMOS Gates [chapter]

Stefan Mangard, Thomas Popp, Berndt M. Gammel
2005 Lecture Notes in Computer Science  
Besides a thorough theoretical analysis of the DPA-resistance of masked gates in the presence of glitches, we also provide simulation results that confirm the theoretical elaborations.  ...  There are many articles and patents on the masking of logic gates. However, the existing publications assume that a masked logic gate switches its output no more than once per clock cycle.  ...  This time difference affects in particular the implementation according to [22, 23] . The time difference leads to a significant increase of the maximum of the DPA peak that occurs in the attack.  ... 
doi:10.1007/978-3-540-30574-3_24 fatcat:eviduuqngvfppkfrauzpqguezi

Distance Bounding: A Practical Security Solution for Real-Time Location Systems

Adnan Abu-Mahfouz, Gerhard P. Hancke
2013 IEEE Transactions on Industrial Informatics  
The practical resource requirements and performance tradeoffs involved are illustrated using a sample of distance-bounding proposals, and some remaining research challenges with regards to practical implementation  ...  This paper gives a brief overview of distance-bounding protocols and discusses the possibility of implementing such protocols within industrial RFID and real-time location applications, which requires  ...  This is a practical and reasonable assumption as attackers are in practice computationally limited and will introduce a time delay each time data is received and then retransmitted by a proxy device.  ... 
doi:10.1109/tii.2012.2218252 fatcat:tz6hrgy6hnegritw7tdglc625u

Fault Sensitivity Analysis [chapter]

Yang Li, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, Kazuo Ohta
2010 Lecture Notes in Computer Science  
This paper presents two practical FSA attacks against two AES hardware implementations on SASEBO-R, PPRM1-AES and WDDL-AES.  ...  We also discuss a masking technique as a potential countermeasure against the proposed fault-based attack.  ...  Acknowledgement The authors would like to thank the anonymous referees for their valuable comments.  ... 
doi:10.1007/978-3-642-15031-9_22 fatcat:fwb4n6pz4fbs7gd4g2pyj6bilm

Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems

Yi Zhao, Chi-Hang Fred Fung, Bing Qi, Christine Chen, Hoi-Kwong Lo
2008 Physical Review A. Atomic, Molecular, and Optical Physics  
Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system.  ...  Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system.  ...  The time-shift attack, like any other quantum hacking attack, was demonstrated on a particular implementation of QKD. Therefore, it may not directly apply to all QKD systems.  ... 
doi:10.1103/physreva.78.042333 fatcat:e424lx3esvc6bh7b3h5pif3j34

Web Services Security Assessment: An Authentication-Focused Approach [chapter]

Yannis Soupionis, Miltiadis Kandias
2012 IFIP Advances in Information and Communication Technology  
Moreover, we evaluate the web service authentication mechanism proposed in these implementations, not only on a theoretical level (by taking into consideration all the security issues of the implementing  ...  Web services may be able to publish easily their functions to the rest of the web world. At the same time they suffer by several security pitfalls.  ...  This work was performed in the framework of the SPHINX (09SYN-72-419) Project, which is partly funded by the Hellenic General Secretariat for Research and Technology (  ... 
doi:10.1007/978-3-642-30436-1_49 fatcat:xr7he6qdcrcnlka3ndqngwx2de

Introduction to the CHES 2015 special issue

Tim Güneysu, Helena Handschuh
2016 Journal of Cryptographic Engineering  
This work presents a timing attack on RSA implementations that apply the Chinese Remainder Theorem (CRT) and Montgomery's multiplication algorithm, even when protected by the common countermeasure of exponent  ...  The workshop covers a wide spectrum of subjects, from new implementations of cryptographic algorithms, to advances in the field of side channel and fault attacks, to countermeasures and secure implementations  ... 
doi:10.1007/s13389-016-0130-9 fatcat:snyok4vtpfdxlhg7pkze2b65l4

Testing Random-Detector-Efficiency Countermeasure in a Commercial System Reveals a Breakable Unrealistic Assumption

Anqi Huang, Shihan Sajeed, Poompong Chaiwongkhot, Mathilde Soucarros, Matthieu Legre, Vadim Makarov
2016 IEEE Journal of Quantum Electronics  
As a third-party tester, we have found that the first industrial implementation of this countermeasure is effective against the original blinding attack, but not immune to a modified blinding attack.  ...  We find that it is still vulnerable against the modified blinding attack, because an assumption about hardware characteristics on which the proof relies fails in practice.  ...  The improvement of Clavis illustrates a development process of QKD implementation in which the work of implementers and that of testers were widely separated in time.  ... 
doi:10.1109/jqe.2016.2611443 fatcat:eydoymdccbdg5ilimxbjj6zqri

Template Attacks on ECDSA [chapter]

Marcel Medwed, Elisabeth Oswald
2009 Lecture Notes in Computer Science  
Template attacks have been considered exclusively in the context of implementations of symmetric cryptographic algorithms on 8-bit devices.  ...  In this article we show that even SPA resistant implementations of ECDSA on a typical 32-bit platform succumb to template-based SPA attacks.  ...  In addition to the theoretical description, we also show results of a practical implementation of our attacks on a 32-bit processor. This article is organized as follows.  ... 
doi:10.1007/978-3-642-00306-6_2 fatcat:s55hibjxqnhu5oecv3uekq3vdi

Correlation-Enhanced Power Analysis Collision Attack [chapter]

Amir Moradi, Oliver Mischke, Thomas Eisenbarth
2010 Lecture Notes in Computer Science  
The attack requires only six times the number of traces necessary for breaking a comparable unprotected implementation.  ...  At the same time, the presented attack has minimal requirements on the abilities and knowledge of an adversary.  ...  Acknowledgment The authors would like to thank Akashi Satoh and RCIS for the prompt and kind help in obtaining SASEBOs.  ... 
doi:10.1007/978-3-642-15031-9_9 fatcat:dq5gfprqizcwpoybbtxdyadqxm

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, Erik Tews
2014 USENIX Security Symposium  
Three of these side channels are timingbased, and two of them provide the first timing-based Bleichenbacher attacks on SSL/TLS described in the literature.  ...  We were able to successfully recover the PreMasterSecret using three of the four side channels in a realistic measurement setup.  ...  Acknowledgements We would like to thank Graham Steel for providing us their improved Bleichenbacher attack code [4] , and the security of Oracle, Cavium, IBM and F5 for their cooperation.  ... 
dblp:conf/uss/MeyerSWSST14 fatcat:3ehusmbw5jffhot3qi73mjmxvi
« Previous Showing results 1 — 15 out of 473,841 results