Tamper-resistant cryptographic hardware

6Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Cryptosystems are widely used for achieving data confidentiality and authenticated access control. Recent cryptographic algorithms such as AES or RSA are computationally safe in the sense that it is practically impossible to reveal key information from a pair of plain and cipher texts if a key of sufficient length is used. A malicious attacker aims to reveal a key by exploiting implementation flaws in cryptographic modules. Even if there are no flaws in the software, the attacker will try to extract a secret key stored in the security hardware. The side-channel attacks (SCAs) are low cost and powerful against cryptographic hardware. The attacker exploits side-channel information such as power or electro-magnetic emission traces on the cryptographic circuits. In this paper, we will introduce the principle of SCAs and the countermeasures against SCAs.

Cite

CITATION STYLE

APA

Fujino, T., Kubota, T., & Shiozaki, M. (2017). Tamper-resistant cryptographic hardware. IEICE Electronics Express. Institute of Electronics Information Communication Engineers. https://doi.org/10.1587/elex.14.20162004

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free