112 Hits in 8.3 sec

Side Channel Information Set Decoding [article]

Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska
2019 IACR Cryptology ePrint Archive  
This paper presents an attack based on side-channel information and Information Set Decoding (ISD) on the Niederreiter cryptosystem and an evaluation of the practicality of the attack using an electromagnetic  ...  We then enhance our attack by utilizing an ISD approach to support the basic attack and we introduce iterative column chunking to further significantly reduce the number of required side-channel measurements  ...  The algorithm for inspecting the 'high'chunks and locating the 1s within the chunk is given in Algorithm 4. It uses a divide and conquer strategy to reduce the number of needed queries.  ... 
dblp:journals/iacr/LahrNPS19 fatcat:6nrm5llhzfedreccnyfsv6fqkm

Strengthening Sequential Side-Channel Attacks Through Change Detection

Luca Frittoli, Matteo Bocchi, Silvia Mella, Diego Carrera, Beatrice Rossi, Pasqualina Fragneto, Ruggero Susella, Giacomo Boracchi
2020 Transactions on Cryptographic Hardware and Embedded Systems  
We propose a methodology that strengthens sequential attacks by automatically identifying and correcting errors.  ...  Our methodology includes an error-correction procedure that can cope both with false positives of the change-detection test, and inaccuracies of the estimated location of the wrong key guess.  ...  Acknowledgements We warmly thank Alessandro Barenghi and Gerardo Pelosi for the insightful feedback and fruitful discussions.  ... 
doi:10.13154/tches.v2020.i3.1-21 dblp:journals/tches/FrittoliBMCRFSB20 fatcat:ftt5gbuhpzcf7knoph4w57uuny

Algebraic Side-Channel Attacks [chapter]

Mathieu Renauld, François-Xavier Standaert
2010 Lecture Notes in Computer Science  
However, although a number of convincing experiments have been performed against certain reduced algorithms, it is not clear wether these attacks can be successfully applied in general and to a large class  ...  In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers.  ...  As already mentioned, standard DPA attacks exploits a divide-and-conquer strategy and recover several pieces of a secret key independently.  ... 
doi:10.1007/978-3-642-16342-5_29 fatcat:irtzopceczdh7gbrt7zvjd52g4

Introduction to Quantum Cryptography [chapter]

Xiaoqing Tan
2013 Theory and Practice of Cryptography and Network Security Protocols and Technologies  
Acknowledgements This work was conducted when Xiaoqing Tan visited the University of Toronto and is supported by the NSFC 61003258.  ...  Post-quantum cryptography Post-quantum cryptography deals with cryptosystems that run on conventional computers and are secure against attacks by quantum computers.  ...  Since the two bases are chosen randomly by each party, such an intercept-resend attack will give a bit error rate of 0.5×0.5+0.5×0 = 25%, which is readily detectable by Alice and Bob.  ... 
doi:10.5772/56092 fatcat:g2zu3rnwwnfn5akgrrpcoi675q


2022 TAGA Journal  
Managing a large amount of data in cloud is current trend and the challenging task is to secure it against unauthorized manipulations.  ...  By scrambling the whole mutual document, Privacy is maintained for confidential information that need to be secured and the personal information can't be viewed or modified by unauthorized person.  ...  Firstly, despite the powerful machines and powerful security mechanisms provided by CSP, remote data still face network attacks, hardware failures and administrative errors.  ... 
doi:10.37896/pd91.4/91461 fatcat:qka63bohkvgybirv6o6et5mdha

Survey on cyberspace security

HuanGuo Zhang, WenBao Han, XueJia Lai, DongDai Lin, JianFeng Ma, JianHua Li
2015 Science China Information Sciences  
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace.  ...  This paper gives a comprehensive introduction to research and development in this field, with a description of existing problems and some currently active research topics in the areas of cyberspace itself  ...  Acknowledgements This work was supported by National Natural Science Foundation of China (Grant Nos. 2014CB340601, 61332019, 61379139, U1135002, U1405255, 61431008, 2013CB329603).  ... 
doi:10.1007/s11432-015-5433-4 fatcat:b2tv6gvovngxhlz7iukug2ehiy

A Tutorial on Physical Security and Side-Channel Attacks [chapter]

François Koeune, François-Xavier Standaert
2005 Lecture Notes in Computer Science  
This gave birth to implementation-specific attacks, which often turned out to be much more efficient than the best known cryptanalytic attacks against the underlying primitive as an idealized object.  ...  This paper aims at providing a tutorial on the subject, overviewing the main kinds of attacks and highlighting their underlying principles.  ...  This factor can sometimes be mitigated using an error detection/correction strategy [63] .  ... 
doi:10.1007/11554578_3 fatcat:4zw63o6xs5hvjlll7mc3mvts4a

QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme [article]

Koksal Mus, Saad Islam, Berk Sunar
2020 IACR Cryptology ePrint Archive  
The QuantumHammer attack is a combination of two attacks, a bittracing attack enabled via Rowhammer fault injection and a divide and conquer attack that uses bit-tracing as an oracle.  ...  We employ a divide and conquer attack which exploits the structure in the key generation part of LUOV and solves the system of equations for the secret key more efficiently with few key bits recovered  ...  Department of State, Bureau of Educational and Cultural Affair's Fulbright Program and by the National Science Foundation under grant CNS-1814406.  ... 
dblp:journals/iacr/MusIS20 fatcat:mqaaipgttfc6xjrxufbuey6oq4

Recent advances in deep learning‐based side‐channel analysis

Sunghyun Jin, Suhri Kim, HeeSeok Kim, Seokhie Hong
2020 ETRI Journal  
K E Y W O R D S deep learning, machine learning, non-profiling attack, profiling attack, side-channel analysis 2 | JIN et al.  ...  In particular, we outline how deep learning is applied to side-channel analysis, based on deep learning architectures and application methods.  ...  Although many factors support this consideration, a particular factor is that it is possible to adopt the divide-and-conquer approach.  ... 
doi:10.4218/etrij.2019-0163 fatcat:lp55bkryirbl7jpkv527kd3dja

Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA [chapter]

Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon
2009 Lecture Notes in Computer Science  
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers.  ...  In this paper, we investigate the extent to which they can be exploited against the AES Rijndael and discuss their practical specificities.  ...  This key recovery is generally performed using a divide-and-conquer strategy, recovering small pieces of the key one by one.  ... 
doi:10.1007/978-3-642-04138-9_8 fatcat:nbkyzlyqfvdrxeeoyeg6s4m2sa

Post-Quantum Cryptography [chapter]

Qijun Gu, Pascal Paillier, Tanja Lange, Edlyn Teske, Darrel Hankerson, Alfred Menezes, David Zhang, Feng Yue, Wangmeng Zuo, Jean-Jacques Quisquater, Gildas Avoine, Gerald Brose (+73 others)
2011 Encyclopedia of Cryptography and Security  
Scientists from all over the world gave talks on the state of the art of quantum computers and on cryptographic schemes that may be able to resist attacks by quantum computers.  ...  We would also like to thank Springer-Verlag, and in particular Ruth Allewelt and Martin Peters, for their support.  ...  We also thank Richard Lindner, Vadim Lyubashevsky, and Chris Peikert for comments on an earlier version.  ... 
doi:10.1007/978-1-4419-5906-5_386 fatcat:ucdkilta7zc3voq7nqctmjkcr4

A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks [chapter]

Romain Poussier, Yuanyuan Zhou, François-Xavier Standaert
2017 Lecture Notes in Computer Science  
The wide number and variety of side-channel attacks against scalar multiplication algorithms makes their security evaluations complex, in particular in case of time constraints making exhaustive analyses  ...  In this paper, we present a systematic way to evaluate the security of such implementations against horizontal attacks.  ...  This work has been funded in parts by the European Commission through the H2020 project 731591 (acronym REAS-SURE) and the ERC project 724725 (acronym SWORD).  ... 
doi:10.1007/978-3-319-66787-4_26 fatcat:w3xpfpff7zf4hliips3kpcdmyi

An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures

Wencheng Yang, Jiankun Hu, Song Wang, Milos Stojmenovic
2014 Pattern Recognition  
Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image prealignment, which is very hard to achieve, and the image rotation transformation during  ...  In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on  ...  Most existing bio-cryptosystem matching algorithms are dependent on error-correction codes to rectify biometric uncertainty.  ... 
doi:10.1016/j.patcog.2013.10.001 fatcat:qhqd4i6zzrgcxgaxhpphnk44su

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment  ...  and electronic-governance.  ...  Acknowledgements We would like to acknowledge and thank the efforts of Dr. Barbara Harmes, and Hawa Bahedh as well as the valuable feedback of the reviewers.  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone

A Survey On Security In Wireless Sensor Network

Faris Fazlic, Seyed Ali Hashemi, Ahmed Aletic, Ali Abd Almisreb, Syamimi Mohd Norzeli, Norashidah Md Din
2019 Southeast Europe Journal of Soft Computing  
There is numerous applications for wireless sensor networks, and security is vital for many of them.  ...  Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs).  ...  [74] proposed SDAP, a secure hop-by-hop data aggregation protocol for sensor networks, using the principles of divide-and-conquer and commitand-attest.  ... 
doi:10.21533/scjournal.v8i1.174 fatcat:5qi4jzi6g5cfldjyuhyf2qku7u
« Previous Showing results 1 — 15 out of 112 results