• DocumentCode
    2017486
  • Title

    Active hardware attacks and proactive countermeasures

  • Author

    Voyiatzis, Artemios G. ; Serpanos, Dimitrios N.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Patras Univ., Greece
  • fYear
    2002
  • fDate
    2002
  • Firstpage
    361
  • Lastpage
    366
  • Abstract
    Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir (1988) scheme, and Schnorr´s scheme. Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typically cryptographic keys, owned by the service provider and often implement the Fiat-Shamir identification scheme. Given the strength of active attacks and the increasingly wide deployment of client systems, it is desirable to design proactive countermeasures for them. We focus on the Fiat-Shamir scheme. We prove that the conventional active attack can be easily avoided through appropriate system and protocol configuration; we denote this configuration as the precautious Fiat-Shamir Scheme. We argue that proactive countermeasures against active attacks are feasible and lead to systems that are inherently resistant to active attacks by careful protocol design, rather than ad hoc solutions.
  • Keywords
    cellular radio; cryptography; message authentication; protocols; telecommunication security; television networks; visual communication; Bellcore attack; Fiat-Shamir identification scheme; RSA; Schnorr´s scheme; active hardware attacks; cellular telephony; client authentication; cryptographic keys; cryptographic secrets; pay-per view TV; precautious Fiat-Shamir scheme; proactive countermeasures; protocol configuration; protocol design; service provider; side-channel cryptanalysis; smart cards impersonation; system configuration; video distribution; Algorithm design and analysis; Authentication; Cryptographic protocols; Cryptography; Electromagnetic measurements; Hardware; Power measurement; Public key; TV; Telephony;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
  • ISSN
    1530-1346
  • Print_ISBN
    0-7695-1671-8
  • Type

    conf

  • DOI
    10.1109/ISCC.2002.1021702
  • Filename
    1021702