Refine
Departments, institutes and facilities
Document Type
- Conference Object (22)
- Report (2)
- Article (1)
- Part of a Book (1)
- Doctoral Thesis (1)
Year of publication
Has Fulltext
- no (27) (remove)
Keywords
- DPA (3)
- Fault analysis (3)
- IP protection (3)
- Basic Access Control (2)
- Boolean Masking (2)
- E-Passport (2)
- Embedded software (2)
- MRTD (2)
- Power Analysis (2)
- Side Channel Cryptanalysis (2)
- Side-channel analysis (2)
- Stochastic Model (2)
- AES (1)
- AES hardware (1)
- AMD Family 15h (1)
- ARM Cortex M3 Processor (1)
- Adversarial Model (1)
- Antifuse memory (1)
- Authorship watermark (1)
- Beacon Chain (1)
- Biometrics (1)
- Block cipher (1)
- COPACOBANA (1)
- CPA (1)
- CPUID instruction (1)
- CUDA (1)
- Cache line fingerprinting (1)
- Cache-independent (1)
- Chip ID (1)
- Code similarity analysis (1)
- Counterfeit protection (1)
- Covert channel (1)
- Cross-core (1)
- DES (1)
- DFA Lab (1)
- DPA Lab (1)
- Differential analysis (1)
- Differential side-channel analysis (1)
- Differentielle Kryptoanalyse (1)
- Digital watermarking (1)
- EM Algorithm (1)
- EM leakage (1)
- Eingebettetes System (1)
- Elliptic Curve Cryptography (1)
- Ethereum (1)
- FPGA implementation (1)
- Fault Channel Watermarking Lab (1)
- Fault-channel watermarks (1)
- Fehlerbehandlung (1)
- Fingerprint watermark (1)
- Gaussian Mixture Models (1)
- Graphics Cards (1)
- High-Order Attacks (1)
- Higher-Order Analysis (1)
- Higher-Order Side Channel Analysis (1)
- IC identification (1)
- Implementation Attack (1)
- Information hiding (1)
- Instruction scheduling (1)
- Key Search Machine (1)
- LOTUS Sensor Node (1)
- Leakage circuits (1)
- MESD (1)
- MRTD Cracker (1)
- Machine Learning (1)
- Microarchitectural Data Sampling (MDS) (1)
- Multithreaded and multicore architecture (1)
- Multivariate Analyse (1)
- Multivariate Side Channel Analysis (1)
- Performance Analysis (1)
- Physical Security (1)
- Physikalischer Effekt (1)
- Plagiat (1)
- Privacy (1)
- Proof of Stake (1)
- RF Eavesdropper (1)
- Rank correlation (1)
- SEMA (1)
- SHA-1 (1)
- ScalarMultiplication (1)
- Second-Order DPA (1)
- Seitenkanalattacke (1)
- Side Channel Analysis (1)
- Side Channel Countermeasures (1)
- Side Channel Cryptanalysis, Stochastic Methods (1)
- Side Channel Watermarking Lab (1)
- Side channel attack (1)
- Side channels (1)
- Side-channel watermarking (1)
- Similarity matrix (1)
- Simulator (1)
- Software (1)
- Software IP protection (1)
- Software reverse engineering (1)
- Stream cipher (1)
- Support Vector Machine (1)
- Tamper-Proof Hardware (1)
- Tampering (1)
- Template Attack (1)
- Template Attacks (1)
- Template attacks (1)
- Templates (1)
- Timing analysis (1)
- Timing channel (1)
- TinyECC 2.0 (1)
- VLSI (1)
- Watermarking (1)
- Wireless Sensor Network (1)
- ZombieLoad (1)
- blockchain (1)
- cryptanalytic attacks (1)
- denial-of-service (1)
- eavesdropping (1)
- embedded systems (1)
- manipulation (1)
- radio-frequency identification (RFID) systems (1)
This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a new evolving discipline in implementation security of information systems.
Physical observables such as the power consumption or electromagnetic emanation of a cryptographic module are so-called `side channels'. They contain exploitable information about internal states of an implementation at runtime. Physical effects can also be used for the injection of faults. Fault injection is successful if it recovers internal states by examining the effects of an erroneous state propagating through the computation.
The best currently known approach in physical cryptanalysis is a thorough experimental verification at a profiling stage, which is included in methods achieving maximum power. The final multivariate algorithms of this thesis can be seen as the most efficient ones in side channel cryptanalysis.
This paper presents implementation results of several side channel countermeasures for protecting the scalar multiplication of ECC (Elliptic Curve Cryptography) implemented on an ARM Cortex M3 processor that is used in security sensitive wireless sensor nodes. Our implementation was done for the ECC curves P-256, brainpool256r1, and Ed25519. Investigated countermeasures include Double-And-Add Always, Montgomery Ladder, Scalar Randomization, Randomized Scalar Splitting, Coordinate Randomization, and Randomized Sliding Window. Practical side channel tests for SEMA (Simple Electromagnetic Analysis) and MESD (Multiple Exponent, Single Data) are included. Though more advanced side channel attacks are not evaluated, yet, our results show that an appropriate level of resistance against the most relevant attacks can be reached.
On an Integration of an Information Security Management System into an Enterprise Architecture
(2010)
Fault-Channel Watermarks
(2016)