de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
Schliessen
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Werk suchen
Tamper resistance of AES : Models, attacks and countermeasures / Volker Krummel. 2007
Inhalt
Introduction
The Advanced Encryption Standard (AES)
Symmetric Block Ciphers
Basic Algebraic Structures of AES
Representation of Data
The Finite Field F2[x]/"426830A x8+x4+x3+x+1"526930B
The Ring F2[x]/"426830A x8+1"526930B
The Ring R=F256[y]/"426830A y4+1"526930B
The Standard Implementation of AES
State Transformations
Encryption
Key Expansion
Decryption
The Fast Implementation of AES
Security and Side Channel Attacks
General Principles of Side Channel Attacks
Side Channels
Timing Attack
Power Analysis
Fault Attacks
Cache Attacks
Other Side Channel Attacks
Countermeasures
Provably Secure Randomization of Cryptographic Algorithms
Security Model
Discussion of the Security Notion
Masking AES
Perfectly Masking AES against Order-1 Adversaries
Idea
Method
Security Analysis
Simplified Version
Implementation and Costs
Efficient Hardware Implementation over GF(((22)2)2)
Cost and Comparison to Previous Countermeasures
Order-d Perfectly Masking
Perfect Mask Change
Squaring
Multiplication
Conclusions
Fault Based Collision Attacks
The Concept of Fault Attacks
Methods to Induce Faults
Fault Models
The Concept of Collision Attacks
New Fault Model
Notation
Model
Fault Based Collision Attacks on AES
Basic Attack
Second Attack
Third Attack
Fourth Attack
Fifth Attack
Conclusion
Cache Behavior Attacks (CBAs)
Cache Mechanism and Technical Background
Security Models for CBAs
Fundamental Model for CBAs
Time Driven CBA
Trace Driven CBA
Access Driven CBA
Extending the Threat Model for Access Driven CBAs
Access Driven CBAs on AES
Access Driven CBA on the First Round
Access Driven CBA on the Last Round
General Methods to Thwart CBAs
Information Leakage and Resistance
Information Leakage and Resistance of Selected Implementations
Countermeasures Based on Permutations
An Access Driven CBA on a Permuted Sbox
Separability and Distinguished Permutations
Summary of Countermeasures and Open Problems
Sbox Tables T0,…, T4 of AES
Decompositions of the AES Sbox
Die detaillierte Suchanfrage erfordert aktiviertes Javascript.