On the study of physical cryptanalysis
碩士 === 國立中央大學 === 資訊工程研究所 === 89 === Nowadays, some popular and small electronic devices, e.g., smart IC cards, are developed in order to provide possible solutions for data security, such as data processing and storage. However, these devices operate frequently in public environments and...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2001
|
Online Access: | http://ndltd.ncl.edu.tw/handle/01330540871944623383 |
id |
ndltd-TW-089NCU00392062 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-089NCU003920622016-01-29T04:28:35Z http://ndltd.ncl.edu.tw/handle/01330540871944623383 On the study of physical cryptanalysis 實體密碼攻擊法之研究 楊舜民 碩士 國立中央大學 資訊工程研究所 89 Nowadays, some popular and small electronic devices, e.g., smart IC cards, are developed in order to provide possible solutions for data security, such as data processing and storage. However, these devices operate frequently in public environments and may suffer to leak secret information. In this thesis, physical cryptanalysis will be examined with great details. Physical cryptanalysis analyze careless implements of cryptosystems and open a brand new direction of cryptanalysis during the past few years. In this thesis, we focus especially on the fault-based attack and timing attack. In Chapter 4, new fault-based attacks on IDEA and RC5 (and also RC6) ciphers are considered. These attacks are conducted upon either modular addition or modular multiplication. Moreover, these two modular operations are used frequently in many cryptosystems, so their security should be considered extensively. Analysis shows that the considered cryptanalysis in this thesis is reasonable. Division chain algorithm was originally developed for improving exponentiation computation. In Chapter 5, the concept of randomized division chain is proposed to counteract the possible timing cryptanalysis when performing an exponentiation computation. Hybrid attacks, i.e., a novel combination of more than one physical cryptanalysis at the same time, are believed to be much powerful than any single physical cryptanalysis. In Chapter 6, possible guidelines, although not exhaustive, to prevent hybrid attacks are considered. 顏嵩銘 2001 學位論文 ; thesis 75 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程研究所 === 89 === Nowadays, some popular and small electronic devices, e.g., smart IC cards, are developed in order to provide possible solutions for data security, such as data processing and storage. However, these devices operate frequently in public environments and may suffer to leak secret information.
In this thesis, physical cryptanalysis will be examined with great details. Physical cryptanalysis analyze careless implements of cryptosystems and open a brand new direction of cryptanalysis during the past few years. In this thesis, we focus especially on the fault-based attack and timing attack.
In Chapter 4, new fault-based attacks on IDEA and RC5 (and also RC6) ciphers are considered. These attacks are conducted upon either modular addition or modular multiplication. Moreover, these two modular operations are used frequently in many cryptosystems, so their security should be considered
extensively. Analysis shows that the considered cryptanalysis in this thesis is reasonable.
Division chain algorithm was originally developed for improving exponentiation computation. In Chapter 5, the concept of randomized division chain is proposed to counteract the possible timing cryptanalysis when performing an exponentiation computation.
Hybrid attacks, i.e., a novel combination of more than one physical cryptanalysis at the same time, are believed to be much powerful than any single physical cryptanalysis. In Chapter 6, possible guidelines, although not exhaustive, to
prevent hybrid attacks are considered.
|
author2 |
顏嵩銘 |
author_facet |
顏嵩銘 楊舜民 |
author |
楊舜民 |
spellingShingle |
楊舜民 On the study of physical cryptanalysis |
author_sort |
楊舜民 |
title |
On the study of physical cryptanalysis |
title_short |
On the study of physical cryptanalysis |
title_full |
On the study of physical cryptanalysis |
title_fullStr |
On the study of physical cryptanalysis |
title_full_unstemmed |
On the study of physical cryptanalysis |
title_sort |
on the study of physical cryptanalysis |
publishDate |
2001 |
url |
http://ndltd.ncl.edu.tw/handle/01330540871944623383 |
work_keys_str_mv |
AT yángshùnmín onthestudyofphysicalcryptanalysis AT yángshùnmín shítǐmìmǎgōngjīfǎzhīyánjiū |
_version_ |
1718171626698178560 |