Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

In recent years applied cryptography has developed considerably to satisfy the - creasing security requirements of various information technology disciplines, such as telecommunications, networking, database systems, mobile applications and others. Cryptosystems are inherently computationally complex and in order to satisfy the high throughput requirements of many applications, they are often implemented by means of either VLSI devices (cryptographic accelerators) or highly optimized software routines (cryptographic libraries) and are used via suitable (network) protocols. The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access and low cost of cryptographic devices resulted in increased concerns regarding the reliability and security of crypto-devices. The effectiveness of side channel attacks on cryptographic devices, like timing and power-based attacks, has been known for some time. Several recent investigations have demonstrated the need to develop methodologies and techniques for designing robust cryptographic systems (both hardware and software) to protect them against both accidental faults and maliciously injected faults with the purpose of extracting the secret key. This trend has been particularly motivated by the fact that the equipment needed to carry out a successful side channel attack based on fault injection is easily accessible at a relatively low cost (for example, laser beam technology), and that the skills needed to use it are quite common. The identification of side channel attacks based on fault injections and the development of appropriate counter-measures have therefore become an active field of scientific and industrial research.

Author(s): Shay Gueron, Jean-Pierre Seifert (auth.), Luca Breveglieri, Israel Koren, David Naccache, Jean-Pierre Seifert (eds.)
Series: Lecture Notes in Computer Science 4236
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 258
Tags: Computer Communication Networks; Data Encryption; Operating Systems; Management of Computing and Information Systems; Computers and Society; Information Storage and Retrieval

Front Matter....Pages -
Is It Wise to Publish Your Public RSA Keys?....Pages 1-12
Wagner’s Attack on a Secure CRT-RSA Algorithm Reconsidered....Pages 13-23
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults....Pages 24-35
Sign Change Fault Attacks on Elliptic Curve Cryptosystems....Pages 36-52
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection....Pages 53-61
Blinded Fault Resistant Exponentiation....Pages 62-70
Incorporating Error Detection in an RSA Architecture....Pages 71-79
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation....Pages 80-87
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors....Pages 88-97
A Fault Attack Against the FOX Cipher Family....Pages 98-105
Fault Based Collision Attacks on AES....Pages 106-120
An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers....Pages 121-130
An Adversarial Model for Fault Analysis Against Low-Cost Cryptographic Devices....Pages 131-143
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults....Pages 144-158
A Comparative Cost/Security Analysis of Fault Attack Countermeasures....Pages 159-172
Non-linear Residue Codes for Robust Public-Key Arithmetic....Pages 173-184
Fault Attack Resistant Cryptographic Hardware with Uniform Error Detection....Pages 185-195
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography....Pages 196-210
DPA on Faulty Cryptographic Hardware and Countermeasures....Pages 211-222
Fault Analysis of DPA-Resistant Algorithms....Pages 223-236
Java Type Confusion and Fault Attacks....Pages 237-251
Back Matter....Pages -