보안 칩에서 중요 키의 공격(부채널 공격 중심) 기술 동향

  • Published : 2016.07.25

Abstract

Keywords

References

  1. KeeLoq, by Wikipedia, http://en.wikipedia.org/wiki/KeeLoq
  2. Why being open about security makes us all safer in the long run, Bruce Schneier, The Guardian, Aug. 2008, http://www.guardian.co.uk/technology/2008/aug/07/hacking.security
  3. "Unhackable" Infineon Chip Physically Cracked, Fox Business, Feb. 2010, http://www.foxbusiness.com/personalfinance/2010/02/11/unhackable-infineon-chip-physicallycracked/
  4. Hacker Shows Off Lethal Attack By Controlling Wireless Medical Device, Bloomberg, Feb. 2012, http://go.bloomberg.com/tech-blog/2012-02-29-hacker-shows-off-lethalattack-by-controlling-wireless-medical-device/
  5. Timing Attack on Implementation of Diffie-Hellman, RSA, DSS and other Systems, P. Kocher
  6. Differential Power Analysis, P. Kocher, J. Jaffe, B. Jun, Crypto'99, LNCS 1666, 1999
  7. ElectroMagnetic Analysis (EMA) : Measures and Countermeasures for Smart Cards, J. Quisquater, D. Samyde, E-smart 2001, LNCS 2140, 2001
  8. Daniel Genkin, Itamar Pipman, Eran Tromer, Get your hands off my laptop: physical side-channel key-extraction attacks on PCs, proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES) 2014, LNCS 8731, 242-260, Springer, 2014
  9. Daniel Genkin, Adi Shamir, Eran Tromer, RSA key extraction via low-bandwidth acoustic cryptanalysis, proc. CRYPTO 2014, part I, LNCS 8616, 444-461, 2014
  10. Houda Ferradi, Remi Geraud, David Naccache, Assia Tria, When organized crime applies academic results: a forensic analysis of an in-card listening device, Journal of Cryptographic Engineering, Volume 6, Issue 1, pp 49-59, April 2016 https://doi.org/10.1007/s13389-015-0112-3
  11. Steven J. Murdoch, Saar Drimer, Ross Anderson, Mike Bond, Chip and PIN is Broken, proc. 2010 IEEE Symposium on Security and Privacy, pp. 433-446, May 2010