vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would he...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Moscow Engineering Physics Institute
2014-05-01
|
Series: | Bezopasnostʹ Informacionnyh Tehnologij |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/213 |
id |
doaj-7252e00681e74ab68d192e1560548cc7 |
---|---|
record_format |
Article |
spelling |
doaj-7252e00681e74ab68d192e1560548cc72020-11-24T23:56:55ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362014-05-01212213vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic AlgorithmsRoman Gevorkovich Korkikian0Evgeny Yurievich Rodionov1Alexander Vladimirovich Mamaev2Kudelski SecurityESETNational Research Nuclear University “MEPhI”The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks.https://bit.mephi.ru/index.php/bit/article/view/213vulnerabilitycryptographic protocolphysical propertiesside-channelsinduced faults |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Roman Gevorkovich Korkikian Evgeny Yurievich Rodionov Alexander Vladimirovich Mamaev |
spellingShingle |
Roman Gevorkovich Korkikian Evgeny Yurievich Rodionov Alexander Vladimirovich Mamaev vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms Bezopasnostʹ Informacionnyh Tehnologij vulnerability cryptographic protocol physical properties side-channels induced faults |
author_facet |
Roman Gevorkovich Korkikian Evgeny Yurievich Rodionov Alexander Vladimirovich Mamaev |
author_sort |
Roman Gevorkovich Korkikian |
title |
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms |
title_short |
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms |
title_full |
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms |
title_fullStr |
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms |
title_full_unstemmed |
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms |
title_sort |
vulnerability analysis techniques of hardware and software implementations of cryptographic algorithms |
publisher |
Moscow Engineering Physics Institute |
series |
Bezopasnostʹ Informacionnyh Tehnologij |
issn |
2074-7128 2074-7136 |
publishDate |
2014-05-01 |
description |
The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks. |
topic |
vulnerability cryptographic protocol physical properties side-channels induced faults |
url |
https://bit.mephi.ru/index.php/bit/article/view/213 |
work_keys_str_mv |
AT romangevorkovichkorkikian vulnerabilityanalysistechniquesofhardwareandsoftwareimplementationsofcryptographicalgorithms AT evgenyyurievichrodionov vulnerabilityanalysistechniquesofhardwareandsoftwareimplementationsofcryptographicalgorithms AT alexandervladimirovichmamaev vulnerabilityanalysistechniquesofhardwareandsoftwareimplementationsofcryptographicalgorithms |
_version_ |
1725455789962821632 |