vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms

The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would he...

Full description

Bibliographic Details
Main Authors: Roman Gevorkovich Korkikian, Evgeny Yurievich Rodionov, Alexander Vladimirovich Mamaev
Format: Article
Language:English
Published: Moscow Engineering Physics Institute 2014-05-01
Series:Bezopasnostʹ Informacionnyh Tehnologij
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/213
id doaj-7252e00681e74ab68d192e1560548cc7
record_format Article
spelling doaj-7252e00681e74ab68d192e1560548cc72020-11-24T23:56:55ZengMoscow Engineering Physics Institute Bezopasnostʹ Informacionnyh Tehnologij2074-71282074-71362014-05-01212213vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic AlgorithmsRoman Gevorkovich Korkikian0Evgeny Yurievich Rodionov1Alexander Vladimirovich Mamaev2Kudelski SecurityESETNational Research Nuclear University “MEPhI”The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks.https://bit.mephi.ru/index.php/bit/article/view/213vulnerabilitycryptographic protocolphysical propertiesside-channelsinduced faults
collection DOAJ
language English
format Article
sources DOAJ
author Roman Gevorkovich Korkikian
Evgeny Yurievich Rodionov
Alexander Vladimirovich Mamaev
spellingShingle Roman Gevorkovich Korkikian
Evgeny Yurievich Rodionov
Alexander Vladimirovich Mamaev
vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
Bezopasnostʹ Informacionnyh Tehnologij
vulnerability
cryptographic protocol
physical properties
side-channels
induced faults
author_facet Roman Gevorkovich Korkikian
Evgeny Yurievich Rodionov
Alexander Vladimirovich Mamaev
author_sort Roman Gevorkovich Korkikian
title vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
title_short vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
title_full vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
title_fullStr vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
title_full_unstemmed vulnerability Analysis Techniques of Hardware and Software Implementations of Cryptographic Algorithms
title_sort vulnerability analysis techniques of hardware and software implementations of cryptographic algorithms
publisher Moscow Engineering Physics Institute
series Bezopasnostʹ Informacionnyh Tehnologij
issn 2074-7128
2074-7136
publishDate 2014-05-01
description The article is a brief survey of hardware vulnerability analysis methods that might be applicable against cryptographic algorithm implementations. Those methods are based on physical properties of a device processing the algorithm. Focusing on mathematical algorithm’s background the article would help mastering various implementation-based attacks.
topic vulnerability
cryptographic protocol
physical properties
side-channels
induced faults
url https://bit.mephi.ru/index.php/bit/article/view/213
work_keys_str_mv AT romangevorkovichkorkikian vulnerabilityanalysistechniquesofhardwareandsoftwareimplementationsofcryptographicalgorithms
AT evgenyyurievichrodionov vulnerabilityanalysistechniquesofhardwareandsoftwareimplementationsofcryptographicalgorithms
AT alexandervladimirovichmamaev vulnerabilityanalysistechniquesofhardwareandsoftwareimplementationsofcryptographicalgorithms
_version_ 1725455789962821632