Abstract
Abstract This work presents two implementation attacks against cryptographic algorithms. Based on these two presented attacks, this thesis shows that the assessment of physical attack complexity is error-prone. Hence, cryptography should not rely on it. Cryptographic technologies have to be protected against all implementation attacks, have they already been realized or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is understood.
Highlights
Cryptanalysis is the art and science of revealing secret information of cryptographic systems
Based on this low-cost setup, we developed the theory of Simple Photonic Emission Analysis (SPEA) and Differential Photonic Emission Analysis (DPEA) and conducted practical attacks
We explained the theory of Simple Photonic Emission Analysis and Differential Photonic Emission Analysis and showed successful photonic side channel attacks against Advanced Encryption Standard (AES) based on a low-cost measurement setup
Summary
Cryptanalysis is the art and science of revealing secret information of cryptographic systems. The resistance against physical attacks is an important consideration These do not target the underlying mathematical principles, but the implementation of the cipher. The first group measures physical characteristics of the device performing the attacked cryptographic operations, without modifying the computation These attacks are called passive attacks or side channel attacks. The underlying principle of side channel attacks was known long before 1996, at least to secret services: in 1952, a covert listening device was found in the Moscow embassy of the United States. It was a replica of the Great Seal of the United States, presented from Soviet youths to the U.S ambassador in Moscow already in 1946. Does sensitive information have to be secured with mathematically secure algorithms, but the concrete implementations of these algorithms have to withstand physical attacks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.