Buch
Advanced Methods in Side Channel Cryptanalysis
Kai Schramm
Übersicht
Verlag | : | Bochumer Universitätsverlag Westdeutscher Universitätsverlag |
Buchreihe | : | IT-Security (Bd. 2) |
Sprache | : | Englisch |
Erschienen | : | 25. 08. 2006 |
Seiten | : | 170 |
Einband | : | Kartoniert |
Höhe | : | 210 mm |
Breite | : | 149 mm |
Gewicht | : | 300 g |
ISBN | : | 9783899661873 |
Sprache | : | Englisch |
Autorinformation
Kai Schramm studied Electrical Engineering and Computer Science at the Ruhr University of Bochum, Germany, from 1996 to 2002. After the diploma degree, he continued to work as a Ph.D. student.
In his research he investigated various aspects of smartcard security and side channel cryptanalysis and worked as research intern at Infineon Technologies, the IBM Watson Research Center and the Hitachi Central Research Laboratory.
He graduated in July 2006 from the Ruhr University of Bochum and currently works for Renesas Technology, England, as a security engineer.
Produktinformation
Side channel cryptanalysis attempts to exploit physical leakages of cipher implementations in order to extract secret key information. The dissertation at hand provides a detailed insight into new and refined side channel attacks and corresponding countermeasures. The attacks proposed in this thesis embrace internal collision attacks against the Data Encryption Standard (DES), the Advanced Encryption Standard (AES) and the block ciphers Serpent and Kasumi.
Moreover, an attack which combines the multivariate classification of side channel signals and classic Differential Power Analysis (DPA) is presented.
The blinding of intermediate, key-dependent variables in a cipher with randomized masks is the most common countermeasure against side channel attacks. In this thesis various variants of the masking countermeasure are investigated and performance figures are given. Furthermore, security aspects are examined. For example, it is shown that masked hardware implementations may not prevent side channel attacks due to glitching activities in masked circuits.