Side-channel attacks, countermeasures, and evaluations

From NUEESS

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
==General==
==General==
-
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information. There are several attack methods, among which the power analysis is of our particular interest.
+
[http://en.wikipedia.org/wiki/Side_channel_attack Side channel attack] on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly.

Revision as of 14:58, 30 May 2012

General

Side channel attack on a cryptographic system exploits the correlation between the physical leakage data and the targeted sensitive information, such the as secret key. There are several attack methods, and the power analysis is of our particular interest. Power analysis attack basically examines plenty of power consumption signals sampled during the cryptographic algorithm computation to retrieve the secret keys accordingly.





Whos here now:   Members 0   Guests 0   Bots & Crawlers 5
 
Personal tools