Cryptographic hardware and embedded systems -- CHES 2016 : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings /: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. (2016)
- Record Type:
- Book
- Title:
- Cryptographic hardware and embedded systems -- CHES 2016 : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings /: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. (2016)
- Main Title:
- Cryptographic hardware and embedded systems -- CHES 2016 : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings
- Other Titles:
- CHES 2016
- Further Information:
- Note: Benedikt Gierlichs, Axel Y. Poschmann (eds.).
- Editors:
- Gierlichs, Benedikt
Poschmann, Axel Y - Other Names:
- CHES (Workshop), 18th
- Contents:
- Intro; Preface; CHES 2016; Contents; Side Channel Analysis; Correlated Extra-Reductions Defeat Blinded Regular Exponentiation; 1 Introduction; 2 State of the Art of Extra-Reductions Probabilities; 2.1 Montgomery Modular Multiplication: Definitions and Notations; 2.2 A Bias to Differentiate a Multiply from a Square; 3 A Bias to Test the Dependency of Operations; 3.1 Principle of Correlated Extra-Reductions; 3.2 Methodology to Analyze the Bias; 3.3 Mathematical Derivations; 4 Exploiting the Bias Using Our Attack; 5 Experimental Results; 5.1 Simulations 5.2 Experimental Detection of Extra-Reductions5.3 Conclusions on Experiments; 6 Conclusion; A Analysis of Extra-Reduction in OpenSSL and MbedTLS Source Codes; References; Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme; 1 Introduction; 2 Preliminaries; 3 Secure Multiplication Schemes; 4 Horizontal DPA Attack; 4.1 Problem Description; 4.2 Complexity Lower Bound: Entropy Analysis of Noisy Hamming Weight Leakage; 4.3 Attack with Perfect Hamming Weight Observations; 4.4 Maximum Likelihood Attack: Theoretical Attack with the Full ISW State 5 First Attack: Maximum Likelihood Attack on a Single Matrix Row5.1 Attack Description; 5.2 Complexity Analysis; 5.3 Numerical Experiments; 6 Second Attack: Iterative Attack; 6.1 Attack Description; 6.2 Numerical Experiments; 7 Practical Results; 8 A Countermeasure Against the Previous Attacks; 8.1 Description; 8.2 Security Analysis; A Proof of Lemma 2; References;Intro; Preface; CHES 2016; Contents; Side Channel Analysis; Correlated Extra-Reductions Defeat Blinded Regular Exponentiation; 1 Introduction; 2 State of the Art of Extra-Reductions Probabilities; 2.1 Montgomery Modular Multiplication: Definitions and Notations; 2.2 A Bias to Differentiate a Multiply from a Square; 3 A Bias to Test the Dependency of Operations; 3.1 Principle of Correlated Extra-Reductions; 3.2 Methodology to Analyze the Bias; 3.3 Mathematical Derivations; 4 Exploiting the Bias Using Our Attack; 5 Experimental Results; 5.1 Simulations 5.2 Experimental Detection of Extra-Reductions5.3 Conclusions on Experiments; 6 Conclusion; A Analysis of Extra-Reduction in OpenSSL and MbedTLS Source Codes; References; Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme; 1 Introduction; 2 Preliminaries; 3 Secure Multiplication Schemes; 4 Horizontal DPA Attack; 4.1 Problem Description; 4.2 Complexity Lower Bound: Entropy Analysis of Noisy Hamming Weight Leakage; 4.3 Attack with Perfect Hamming Weight Observations; 4.4 Maximum Likelihood Attack: Theoretical Attack with the Full ISW State 5 First Attack: Maximum Likelihood Attack on a Single Matrix Row5.1 Attack Description; 5.2 Complexity Analysis; 5.3 Numerical Experiments; 6 Second Attack: Iterative Attack; 6.1 Attack Description; 6.2 Numerical Experiments; 7 Practical Results; 8 A Countermeasure Against the Previous Attacks; 8.1 Description; 8.2 Security Analysis; A Proof of Lemma 2; References; Towards Easy Leakage Certification; 1 Introduction; 2 Background; 2.1 Measurement Setup; 2.2 PDF Estimation Methods; 2.3 Evaluation Metrics; 2.4 Estimating a Metric with Cross-validation; 3 A Motivating Negative Result 4 A New Method to Detect Assumption Errors4.1 Test Specification; 5 Simulated Experiments; 6 Software Experiments; 7 Quantifying the Information Loss; 8 Open Source Code; 9 Hardware Experiments; 10 Conclusion; References; Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach; 1 Introduction; 2 Background; 2.1 Algorithms Inputs; 2.2 Preprocessing; 2.3 Toolbox; 3 Enumeration Algorithm; 4 Open Source Code; 5 Performance Evaluations; 5.1 Enumeration Accuracy; 5.2 Factorization; 5.3 Time Complexity; 6 Application Scenarios; 7 Related Work; 8 Conclusion A Additional Time ComplexitesReferences; Automotive Security; Physical Layer Group Key Agreement for Automotive Controller Area Networks; 1 Introduction; 1.1 Our Contributions; 1.2 Related Work; 1.3 Organization; 2 Preliminaries; 2.1 Notation; 2.2 System Model and Assumptions; 2.3 Adversarial Model; 2.4 Cryptographic Assumptions; 2.5 Security Definition; 3 Two Party Plug-and-Secure (PnS) Protocol; 4 Group Key Agreement Schemes; 4.1 Simple Group Protocol; 4.2 Tree Based Group Protocol; 5 Authenticated Group Key Agreement Schemes; 5.1 Authenticated Tree Based Protocol … (more)
- Publisher Details:
- Berlin : Springer
- Publication Date:
- 2016
- Extent:
- 1 online resource (xiv, 650 pages), illustrations
- Subjects:
- 005.8
Data encryption (Computer science) -- Congresses
Computer security -- Congresses
Computer security
Data encryption (Computer science)
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783662531402
3662531402
3662531399
9783662531396 - Related ISBNs:
- 9783662531396
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed August 12, 2016).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.401680
- Ingest File:
- 02_442.xml