International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 03 February 2015

PhD Database PhD Database
Name: AbdelAlim Kamal Farag
Topic: Cryptanalysis and Secure Implementation of Modern Cryptographic Algorithms
Category: public-key cryptography

Description: Cryptanalytic attacks can be divided into two classes: pure mathematical attacks and Side Chan- nel Attacks (SCAs). Pure mathematical attacks are traditional cryptanalytic techniques that rely on known or chosen input /output pairs of the cryptographic function and exploit the inner structure of the cipher to reveal the secret key information. On the other hand, in SCAs, it is assumed that attackers have some access to the cryptographic device and can gain some information from its physical implementation.\r\nCold-boot attack is a SCA which exploits the data remanence property of Random Access Memory (RAM) to retrieve its content which remains readable shortly after its power has been removed. Fault analysis is another example of SCAs in which the attacker is assumed to be able to induce faults in the cryptographic device and observe the faulty output. Then, by careful inspection of faulty outputs, the attacker recovers the secret information, such as secret inner state or secret key. Scan-based Design-For-Test (DFT) is a widely deployed technique for testing hardware chips. Scan-based SCAs exploit the information obtained by analyzing the scanned data in order to retrieve secret information from cryptographic hardware devices that are designed with this testability feature.[...]
Expand

Additional news items may be found on the IACR news page.