Filters








15 Hits in 4.8 sec

Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations [chapter]

Tae Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
2006 Lecture Notes in Computer Science  
In this paper we repair the above attack, and then propose a generic analytical technique applicable to all BSD type countermeasures combined with some simple power analysis countermeasures.  ...  In ICICS'04, Sim et al. proposed an attack against the full version of Ha-Moon's countermeasure which is one of enhanced countermeasures.  ...  The attacks utilize a characteristic of BSD representations generated by a specific random recoding method.  ... 
doi:10.1007/11733447_9 fatcat:76cv6nxuvjbsdinptwjr7yvkg4

Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits [chapter]

Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
2004 Lecture Notes in Computer Science  
Whenever we utilize a countermeasure of BSD type, we should  ...  For this purpose, several scalar multiplication methods that utilize randomized binary-signed-digit (BSD) representations were proposed.  ...  |d Proposed Attack In this section we propose a general side channel attack against the countermeasures with randomized BSD representations, and show the countermeasures are vulnerable to the proposed  ... 
doi:10.1007/978-3-540-24852-1_29 fatcat:5w4tkn2fdvdyrdyznqt66slpwq

Defeating Countermeasures Based on Randomized BSD Representations [chapter]

Pierre-Alain Fouque, Frédéric Muller, Guillaume Poupard, Frédéric Valette
2004 Lecture Notes in Computer Science  
For instance, this is the case of countermeasures proposed by Oswald and Aigner, or Ha and Moon, both based on randomized Binary Signed Digit (BSD) representations.  ...  A new class of countermeasures is based on inserting random decisions when choosing one representation of the secret scalar out of a large set of representations of the same value.  ...  Next, we describe the principles of countermeasures using a randomized BSD representation through the example of [7] .  ... 
doi:10.1007/978-3-540-28632-5_23 fatcat:werfjoseh5hxxb2rwdshmshdry

Randomized Mixed-Radix Scalar Multiplication

Eleonora Guerrini, Laurent Imbert, Theo Winterhalter
2018 IEEE transactions on computers  
Then, using a special form of covering systems called exact n-covers, we present a novel uniformly randomized scalar multiplication algorithm with built-in protections against various types of side-channel  ...  This algorithm can be an alternative to Coron's scalar blinding technique for elliptic curves, in particular when the choice of a particular finite field tailored for speed compels to use a large random  ...  However, in order to safeguard implementations against all known attacks, several countermeasures must be carefully stacked together, while ensuring that this combination of independent, yet good countermeasures  ... 
doi:10.1109/tc.2017.2750677 fatcat:z2f4eiljzzgrldr7eaaga74z3a

The Security Impact of a New Cryptographic Library [chapter]

Daniel J. Bernstein, Tanja Lange, Peter Schwabe
2012 Lecture Notes in Computer Science  
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic  ...  Consider, for example, the following typical combination of RSA, AES, etc.: -Alice generates a random AES key. -Alice uses the AES key to encrypt the packet.  ...  Centralizing randomness. In 2006 a Debian developer removed a critical line of randomness-generation code from the OpenSSL package shipped with Debian GNU/Linux.  ... 
doi:10.1007/978-3-642-33481-8_9 fatcat:xygnrl4xhjeu5mqyreolcthypu

Breaking Randomized Mixed-Radix Scalar Multiplication Algorithms [chapter]

Jérémie Detrey, Laurent Imbert
2019 Lecture Notes in Computer Science  
We eventually present our conclusions regarding the use of mixed-radix representations as a randomization setting.  ...  Our attack can recover the whole key with very few traces, even when those only provide partial information on the sequence of operations.  ...  In this case, randomization is considered as the number-one countermeasure.  ... 
doi:10.1007/978-3-030-30530-7_2 fatcat:egjx234zonh77hgergudc6d3iy

Software-based Microarchitectural Attacks [article]

Daniel Gruss
2017 arXiv   pre-print
Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel.  ...  This thesis consists of two parts.  ...  Our countermeasure requires only a small number of changes to operating system kernels and comes with a performance impact of 0.06-5.09%. Our key contributions are: 1.  ... 
arXiv:1706.05973v1 fatcat:4hwdpe4dancmblsxasg3a75h7a

Redundant Number Systems for Optimising Digital Signal Processing Performance in Field Programmable Gate Array [article]

William Hermanus Michael Kamp, University Of Canterbury
2012
A serial recoding algorithm is developed that generates a redundant representation for a specified value with as few nonzero symbols as possible.  ...  Unlike previously published methods, it accepts a wide specification of number systems including those with irregularly spaced symbol alphabets.  ...  A combination of both might also be implemented. The algorithm may also be used as a basis for generating other types of dominant representations with specific properties.  ... 
doi:10.26021/2754 fatcat:2pafyywjbrfl5nrhgfnrgbskse

ICONS 2016 Committee ICONS 2016 Advisory Committee EMBEDDED 2016 EMBEDDED 2016 Advisory Committee EMBEDDED 2016 Technical Program Committee

Taiwan Technology, Chung
unpublished
a series of events covering a broad spectrum of topics.  ...  Additionally, the distribution of safety requirements between people and machines makes difficult automated proofs of system safety.  ...  ACKNOWLEDGMENT The authors would like to thank members of ETSI SAGE for their expert advice.  ... 
fatcat:n3t6ztbuhfdynk676ouohxs7ue

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1994 Software engineering notes  
:22) *f Airbus A300 AA587 tail "BSD" incident, dropping 3000 feet: screens blanked for 2-3 seconds; unreliable data reset Symbol Generator Unit software changes required (R 21 96) *h/f?  ...  all (R 19 83) H Cooperative database develops winning combinations for Dutch soccer scatchables with 1445 alternatives; competition cancelled (S 22 1:21) $h Programmer unauthorizedly limits sale of certain  ...  Spencer Visa charges in Paris accidentally multiplied by 100 (S 17 3) $f NCStateUniv computer mismatches names, addresses on 6000 bills (S 13 4) $SH Blue Cross/Blue Shield victim of computer generated  ... 
doi:10.1145/181610.181612 fatcat:qfzxpio6tfgl5nmbevta334afi

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1992 Software engineering notes  
:22) *f Airbus A300 AA587 tail "BSD" incident, dropping 3000 feet: screens blanked for 2-3 seconds; unreliable data reset Symbol Generator Unit software changes required (R 21 96) *h/f?  ...  all (R 19 83) H Cooperative database develops winning combinations for Dutch soccer scatchables with 1445 alternatives; competition cancelled (S 22 1:21) $h Programmer unauthorizedly limits sale of certain  ...  Spencer Visa charges in Paris accidentally multiplied by 100 (S 17 3) $f NCStateUniv computer mismatches names, addresses on 6000 bills (S 13 4) $SH Blue Cross/Blue Shield victim of computer generated  ... 
doi:10.1145/134292.134293 fatcat:ayrwcbvvljhrdeav5kvrxaycs4

Illustrative risks to the public in the use of computer systems and related technology

Peter G. Neumann
1996 Software engineering notes  
:22) *f Airbus A300 AA587 tail "BSD" incident, dropping 3000 feet: screens blanked for 2-3 seconds; unreliable data reset Symbol Generator Unit software changes required (R 21 96) *h/f?  ...  all (R 19 83) H Cooperative database develops winning combinations for Dutch soccer scatchables with 1445 alternatives; competition cancelled (S 22 1:21) $h Programmer unauthorizedly limits sale of certain  ...  Spencer Visa charges in Paris accidentally multiplied by 100 (S 17 3) $f NCStateUniv computer mismatches names, addresses on 6000 bills (S 13 4) $SH Blue Cross/Blue Shield victim of computer generated  ... 
doi:10.1145/381790.381797 fatcat:kcxte3luzrg57ms3gwwbqzs5ji

Firewalls and virtual private networks [article]

B. A. Harris, University Of Canterbury
2014
This thesis is concerned with the later; in particular the issues raised by the interconnection of TCPIIP based networks between trusted and untrusted network domains.  ...  Therefore, this thesis examines independent evaluation and certification of firewall architectures with particular focus on New Zealand and Australian efforts.  ...  Perhaps I should start with my supervisor and friend, Ray Hunt, who has provided me with unwavering support, encouragement, and of course much needed criticism.  ... 
doi:10.26021/3118 fatcat:oys4slikuzaplgnyv7yyyjt7g4

Detecting cloud virtual network isolation security for data leakage

Haifa Mohamed Al Nasseri, Ishbel Mary Macdonald Duncan
2019
The outcomes indicated that Cloud manufacturers need to test their isolation mechanisms more fully and enhance them with available solutions.  ...  This research is one of the first empirical building blocks in the field and gives future researchers the basis for building their research on top of the presented methodology and results and for proposing  ...  The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness. b) If plaintext is repeatedly  ... 
doi:10.17630/10023-17524 fatcat:xurwm6paavctjhcuacqfzwtqmm

Illustrative Risks To The Public In The Use Of Computer Systems And Related Technology

P.G. Neumann
Symposium Record Policy Issues in Information and Communication Technologies in Medical Applications  
:22) *f Airbus A300 AA587 tail "BSD" incident, dropping 3000 feet: screens blanked for 2-3 seconds; unreliable data reset Symbol Generator Unit software changes required (R 21 96) *h/f?  ...  all (R 19 83) H Cooperative database develops winning combinations for Dutch soccer scatchables with 1445 alternatives; competition cancelled (S 22 1:21) $h Programmer unauthorizedly limits sale of certain  ...  Spencer Visa charges in Paris accidentally multiplied by 100 (S 17 3) $f NCStateUniv computer mismatches names, addresses on 6000 bills (S 13 4) $SH Blue Cross/Blue Shield victim of computer generated  ... 
doi:10.1109/ictma.1988.669591 fatcat:wkl3mbqyjbdmfhy4wezuzx4juq