CryptoDB
Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing
Authors: | |
---|---|
Download: | |
Abstract: | Side-channel attacks are easy-to-implement whilst powerful attacks against cryptographic implementations, and their targets range from primitives, protocols, modules, and devices to even systems. These attacks pose a serious threat to the security of cryptographic modules. In consequence, cryptographic implementations have to be evaluated for their resistivity against such attacks and the incorporation of different countermeasures has to be considered. This paper surveys the methods and techniques employed in these attacks, the destructive effects of such attacks, the countermeasures against such attacks and evaluation of their feasibility and applicability. Finally, the necessity and feasibility of adopting this kind of physical security testing and evaluation in the development of FIPS 140-3 standard are explored. This paper is not only a survey paper, but also more a position paper. |
BibTeX
@misc{eprint-2005-12722, title={Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing}, booktitle={IACR Eprint archive}, keywords={implementation /}, url={http://eprint.iacr.org/2005/388}, note={ zyb@is.iscas.ac.cn 13083 received 27 Oct 2005}, author={YongBin Zhou and DengGuo Feng}, year=2005 }