DocumentCode :
1180447
Title :
Finding faults [data security]
Author :
Naccache, David
Author_Institution :
Departement d´´lnformatique, Ecofe Normale Superieure, France
Volume :
3
Issue :
5
fYear :
2005
Firstpage :
61
Lastpage :
65
Abstract :
The only way to attack strong cryptographic implementations is to attack the infrastructure upon which they are built. This infrastructure is most often the underlying operating system or middleware, but attacks can also be mounted directly against the hardware upon which the cryptographic implementation is being run. This issue´s Crypto Corner describes some of the methods used to induce faults in systems and explains how such faults can be exploited to reveal secret information.
Keywords :
cryptography; fault diagnosis; confidential information; cryptographic implementation; middleware; operating system; Circuit faults; Clocks; Counting circuits; Cryptography; Data security; Energy consumption; Logic; Privacy; Soil; Weapons; error; fault injection; fault tolerance;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2005.122
Filename :
1514405
Link To Document :
بازگشت