【24h】

Error value driven fault analysis attack

机译:误差值驱动故障分析攻击

获取原文

摘要

The advanced encryption standard (AES) has been sufficiently studied to confirm that its decryption is computationally impossible. However, its vulnerability against fault analysis attacks has been pointed out in recent years. To verify the vulnerability of electronic devices in the future, into which cryptographic circuits have been incorporated, fault Analysis attacks must be thoroughly studied. The present study proposes a new fault analysis attack method which utilizes the tendency of an operation error due to a glitch. The present study also verifies the validity of the proposed method by performing evaluation experiments using FPGA.
机译:已经充分研究了先进的加密标准(AES)以确认其解密是计算的不可能的。然而,它近年来指出了对故障分析攻击的脆弱性。为了验证未来电子设备的漏洞,还包含哪些加密电路,必须彻底研究故障分析攻击。本研究提出了一种新的故障分析攻击方法,其利用由于毛刺由于手术错误的趋势。本研究还通过使用FPGA进行评估实验来验证所提出的方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号