DocumentCode :
2017486
Title :
Active hardware attacks and proactive countermeasures
Author :
Voyiatzis, Artemios G. ; Serpanos, Dimitrios N.
Author_Institution :
Dept. of Electr. & Comput. Eng., Patras Univ., Greece
fYear :
2002
fDate :
2002
Firstpage :
361
Lastpage :
366
Abstract :
Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir (1988) scheme, and Schnorr´s scheme. Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typically cryptographic keys, owned by the service provider and often implement the Fiat-Shamir identification scheme. Given the strength of active attacks and the increasingly wide deployment of client systems, it is desirable to design proactive countermeasures for them. We focus on the Fiat-Shamir scheme. We prove that the conventional active attack can be easily avoided through appropriate system and protocol configuration; we denote this configuration as the precautious Fiat-Shamir Scheme. We argue that proactive countermeasures against active attacks are feasible and lead to systems that are inherently resistant to active attacks by careful protocol design, rather than ad hoc solutions.
Keywords :
cellular radio; cryptography; message authentication; protocols; telecommunication security; television networks; visual communication; Bellcore attack; Fiat-Shamir identification scheme; RSA; Schnorr´s scheme; active hardware attacks; cellular telephony; client authentication; cryptographic keys; cryptographic secrets; pay-per view TV; precautious Fiat-Shamir scheme; proactive countermeasures; protocol configuration; protocol design; service provider; side-channel cryptanalysis; smart cards impersonation; system configuration; video distribution; Algorithm design and analysis; Authentication; Cryptographic protocols; Cryptography; Electromagnetic measurements; Hardware; Power measurement; Public key; TV; Telephony;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
ISSN :
1530-1346
Print_ISBN :
0-7695-1671-8
Type :
conf
DOI :
10.1109/ISCC.2002.1021702
Filename :
1021702
Link To Document :
بازگشت