期刊论文详细信息
IEICE Electronics Express
Tamper-resistant cryptographic hardware
Takeshi Fujino1  Mitsuru Shiozaki2  Takaya Kubota2 
[1] Department of Science and Engineering, Ritsumeikan University;Research Organization of Science and Engineering, Ritsumeikan University
关键词: security;    cryptographic circuit;    tamper resistance;    side channel attack;   
DOI  :  10.1587/elex.14.20162004
学科分类:电子、光学、磁材料
来源: Denshi Jouhou Tsuushin Gakkai
PDF
【 摘 要 】

Cryptosystems are widely used for achieving data confidentiality and authenticated access control. Recent cryptographic algorithms such as AES or RSA are computationally safe in the sense that it is practically impossible to reveal key information from a pair of plain and cipher texts if a key of sufficient length is used. A malicious attacker aims to reveal a key by exploiting implementation flaws in cryptographic modules. Even if there are no flaws in the software, the attacker will try to extract a secret key stored in the security hardware. The side-channel attacks (SCAs) are low cost and powerful against cryptographic hardware. The attacker exploits side-channel information such as power or electro-magnetic emission traces on the cryptographic circuits. In this paper, we will introduce the principle of SCAs and the countermeasures against SCAs.

【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO201902193134949ZK.pdf 6099KB PDF download
  文献评价指标  
  下载次数:12次 浏览次数:17次