Title :
An introduction to implementation attacks and countermeasures
Author_Institution :
Graz University of Technology, Institute for Applied Information Processing and Communications (IAIK), Austria
Abstract :
Implementation attacks pose a serious threat to the security of cryptographic algorithms and protocols. In such attacks, not the abstract descriptions of cryptographic methods are attacked but their practical realizations in cryptographic devices. This opens up a wide range of powerful attacks, which are introduced in this article. Also the main approaches to counteract implementation attacks are discussed.
Keywords :
Authentication; Cryptographic protocols; Data security; Digital signatures; Information processing; Information security; Privacy; Protection; Public key; Public key cryptography; Countermeasures; Fault analysis; Implementation attacks; Side-channel analysis;
Conference_Titel :
Formal Methods and Models for Co-Design, 2009. MEMOCODE '09. 7th IEEE/ACM International Conference on
Conference_Location :
Cambridge, MA, USA
Print_ISBN :
978-1-4244-4806-7
DOI :
10.1109/MEMCOD.2009.5185386