1999
DOI: 10.1007/3-540-48059-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Probing Attacks On Tamper-Resistant Devices

Abstract: Abstract. This paper describes a new type of attack on tamper-resistant cryptographic hardware. We show that by locally observing the value of a few RAM or adress bus bits (possibly a single one) during the execution of a cryptographic algorithm, typically by the mean of a probe (needle), an attacker could easily recover information on the secret key being used; our attacks apply to public-key cryptosystems such as RSA or El Gamal, as well as to secret-key encryption schemes including DES and RC5.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2000
2000
2013
2013

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 33 publications
(22 citation statements)
references
References 17 publications
0
22
0
Order By: Relevance
“…Invasive observations: the ability to drop a single microprobe often suffices to break a cryptosystem (for example, knowledge of a single bitplane suffices to break algorithms such as RSA [10]). Electron microscopes have been used to read voltages on smart card chip surfaces.…”
Section: Unintended Finalisation Single Systemmentioning
confidence: 98%
“…Invasive observations: the ability to drop a single microprobe often suffices to break a cryptosystem (for example, knowledge of a single bitplane suffices to break algorithms such as RSA [10]). Electron microscopes have been used to read voltages on smart card chip surfaces.…”
Section: Unintended Finalisation Single Systemmentioning
confidence: 98%
“…Nearly a decade before the cold boot attack was demonstrated, Handschuh, Paillier, and Stern modeled probing attacks [5] on the square-and-multiply algorithm for modular exponentiation, DES, and RC5. They reconstruct cryptographic secrets by tracing a few critical bits over the target operation's execution.…”
Section: Related Workmentioning
confidence: 99%
“…Manipulation is an invasive attack that gives to the attacker the power of modifying the chip's functionality or of directly probing signals [37], [25].…”
Section: Introductionmentioning
confidence: 99%