DocumentCode
2017486
Title
Active hardware attacks and proactive countermeasures
Author
Voyiatzis, Artemios G. ; Serpanos, Dimitrios N.
Author_Institution
Dept. of Electr. & Comput. Eng., Patras Univ., Greece
fYear
2002
fDate
2002
Firstpage
361
Lastpage
366
Abstract
Active hardware attacks succeed in deriving cryptographic secrets from target devices. They were originally proposed for systems implementing RSA, Fiat-Shamir (1988) scheme, and Schnorr´s scheme. Common targets for these attacks are systems used for client authentication in order to access services, e.g., pay-per view TV, video distribution and cellular telephony. These client systems hold secrets, typically cryptographic keys, owned by the service provider and often implement the Fiat-Shamir identification scheme. Given the strength of active attacks and the increasingly wide deployment of client systems, it is desirable to design proactive countermeasures for them. We focus on the Fiat-Shamir scheme. We prove that the conventional active attack can be easily avoided through appropriate system and protocol configuration; we denote this configuration as the precautious Fiat-Shamir Scheme. We argue that proactive countermeasures against active attacks are feasible and lead to systems that are inherently resistant to active attacks by careful protocol design, rather than ad hoc solutions.
Keywords
cellular radio; cryptography; message authentication; protocols; telecommunication security; television networks; visual communication; Bellcore attack; Fiat-Shamir identification scheme; RSA; Schnorr´s scheme; active hardware attacks; cellular telephony; client authentication; cryptographic keys; cryptographic secrets; pay-per view TV; precautious Fiat-Shamir scheme; proactive countermeasures; protocol configuration; protocol design; service provider; side-channel cryptanalysis; smart cards impersonation; system configuration; video distribution; Algorithm design and analysis; Authentication; Cryptographic protocols; Cryptography; Electromagnetic measurements; Hardware; Power measurement; Public key; TV; Telephony;
fLanguage
English
Publisher
ieee
Conference_Titel
Computers and Communications, 2002. Proceedings. ISCC 2002. Seventh International Symposium on
ISSN
1530-1346
Print_ISBN
0-7695-1671-8
Type
conf
DOI
10.1109/ISCC.2002.1021702
Filename
1021702
Link To Document