Logo des Repositoriums
 

Why cryptography should not rely on physical attack complexity

dc.contributor.authorKrämer, Juliane
dc.date.accessioned2018-04-13T09:40:01Z
dc.date.available2018-04-13T09:40:01Z
dc.date.issued2017
dc.description.abstractThis work presents two implementation attacks against cryptographic algorithms. Based on these two presented attacks, this thesis shows that the assessment of physical attack complexity is error-prone. Hence, cryptography should not rely on it. Cryptographic technologies have to be protected against all implementation attacks, have they already been realized or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is understood.en
dc.identifier.doi10.1515/itit-2016-0051
dc.identifier.pissn1611-2776
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/16415
dc.language.isoen
dc.publisherDe Gruyter
dc.relation.ispartofit - Information Technology: Vol. 59, No. 5
dc.subjectSide channel attack
dc.subject fault attack
dc.subject photonic side channel
dc.subject pairings
dc.titleWhy cryptography should not rely on physical attack complexityen
dc.typeText/Journal Article
gi.citation.publisherPlaceBerlin
gi.citation.startPage53
gi.conference.sessiontitleDistinguished Dissertations

Dateien