< retour aux publications

Countermeasures against Implementation Attacks on Private- and Public-Key Cryptosystems

Auteur(s) : P. Maistri

Doc. Source: International Conference on Applications and Techniques in Information Security

Publisher : Springer

Implementing a secure system is much more complex than providing a theoretically secure algorithm. Careless implementations can be easily vulnerable to a large spectrum of passive and/or active attacks. In this talk, we will present the most important attacks and a (non-exhaustive) list of possible countermeasures that will make the attacker's job a bit harder. Both symmetric and asymmetric cryptography will be presented, with application examples to the Advanced Encryption Standard and Elliptic Curve Cryptosystems.