Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared?

Uwe Dippel, Salman Yussof

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

A relatively recent class of cryptographic attacks has evolved during the last years, focusing on the circumvention of cryptographic means by attacking other than the enciphering means itself. We call this class unencumbered, because the cryptanalysis is achieved without breaking the cipher. The attacker will instead observe the resources of the system at the deciphering process (or its failure). From this observation of the resources used, she will conclude the key being processed at successful deciphering or authentication. In the case of a plaintext attack, the message can be retrieved without breaking the cipher itself. We will introduce the current state of research in this field, some measures to avoid such attacks, and outline our ongoing research to combat such attacks in a more systematic manner.

Original languageEnglish
Title of host publicationProceedings - International Symposium on Information Technology 2008, ITSim
DOIs
Publication statusPublished - 12 Dec 2008
EventInternational Symposium on Information Technology 2008, ITSim - Kuala Lumpur, Malaysia
Duration: 26 Aug 200829 Aug 2008

Publication series

NameProceedings - International Symposium on Information Technology 2008, ITSim
Volume4

Other

OtherInternational Symposium on Information Technology 2008, ITSim
CountryMalaysia
CityKuala Lumpur
Period26/08/0829/08/08

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Information Systems
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Dippel, U., & Yussof, S. (2008). Overview of attacks on unencumbered cryptographic means and their prevention - Can the circle be squared? In Proceedings - International Symposium on Information Technology 2008, ITSim [4632028] (Proceedings - International Symposium on Information Technology 2008, ITSim; Vol. 4). https://doi.org/10.1109/ITSIM.2008.4632028