Title :
Active hardware attacks and proactive countermeasures
Author :
Voyiatzis, Artemios G. ; Serpanos, Dimitrios N.
Author_Institution :
Dept. of Electr. & Comput. Eng., Patras Univ., Greece
Abstract :
Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir (1988) scheme, and Schnorr´s scheme. Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typically cryptographic keys, owned by the service provider and often implement the Fiat-Shamir identification scheme. Given the strength of active attacks and the increasingly wide deployment of client systems, it is desirable to design proactive countermeasures for them. We focus on the Fiat-Shamir scheme. We prove that the conventional active attack can be easily avoided through appropriate system and protocol configuration; we denote this configuration as the precautious Fiat-Shamir Scheme. We argue that proactive countermeasures against active attacks are feasible and lead to systems that are inherently resistant to active attacks by careful protocol design, rather than ad hoc solutions.
Keywords :
cellular radio; cryptography; message authentication; protocols; telecommunication security; television networks; visual communication; Bellcore attack; Fiat-Shamir identification scheme; RSA; Schnorr´s scheme; active hardware attacks; cellular telephony; client authentication; cryptographic keys; cryptographic secrets; pay-per view TV; precautious Fiat-Shamir scheme; proactive countermeasures; protocol configuration; protocol design; service provider; side-channel cryptanalysis; smart cards impersonation; system configuration; video distribution; Algorithm design and analysis; Authentication; Cryptographic protocols; Cryptography; Electromagnetic measurements; Hardware; Power measurement; Public key; TV; Telephony;
Conference_Titel :
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
Print_ISBN :
0-7695-1671-8
DOI :
10.1109/ISCC.2002.1021702