Attacks on Implementation of Cryptographic Algorithms

Attacks on Implementation of Cryptographic Algorithms

DOI: 10.4018/978-1-5225-2915-6.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter investigates the implementation attacks on cryptographic algorithms. The implementation attacks can be defined as invasive or non-invasive. The major attack types are Probing attacks, Fault Induction attacks, timing attacks, Power analysis attacks and Electromagnetic analysis attacks. The attacks target either the physical leakage of a device in which case they are considered physical attacks or try to observe some parameters of the algorithm which constitute logical attacks. The Various countermeasures for the attacks include physical protection against tampering of the device or use redundant computation in the algorithm to prevent observation of the parameters.
Chapter Preview
Top

Targets For Physical Attacks

Here we look at two different types of targets for physical attacks: the Smart Card and the FPGA.

Complete Chapter List

Search this Book:
Reset