Loading...
Please wait, while we are loading the content...
Similar Documents
Overview of the side channel attacks.
| Content Provider | CiteSeerX |
|---|---|
| Author | Reddy, E. Kesavulu |
| Abstract | The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalysists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack models, cryptologists have made commonly-used cryptographic algorithms secure against such attacks. However, a real computing device not only generates the outputs specified in algorithms but also inevitably produces some other information such as timing and power. These types of information, called side-channel information, can be exploited in side-channel attacks to retrieve secret keys. Side channel attacks have successfully broken many algorithms. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Side Channel Attack Secret Key Cryptographic Algorithm Commonly-used Cryptographic Algorithm Secure Side-channel Information Attack Model Side-channel Attack Many Algorithm Block Cipher Real Computing Device Public-key Algorithm Relies |
| Content Type | Text |