CSE 227: Lecture 2

The topics covered in this lecture are RSA, Smart cards, Physical Attacks, Differential Timing Analysis, Differential Power Analysis,


Euler phi function. Encrypt/Decrypt. Modular exponentiation.

Smart Cards

Applications: smart card-based credit cards; satellite television decoding. Used to hold secret key of public key algorithm. Standard cryptographic algorithm analysis do not take physical possession into account.

Physical Attacks

Peeling a chip. Improper operating voltage, clock.

Differential Timing Analysis

Statistical analysis.

Differential Power Analysis

Additional Info

Security vulnerability found in ethernet device driver. Information leak.
[ search CSE | CSE | bsy's home page | links | webster | MRQE | google | yahoo | citeseer | pgp certserver | openpgp certserver ]
picture of bsy

bsy+cse227w03@cs.ucsd.edu, last updated Thu Jan 9 20:50:17 PST 2003. Copyright 2003 Bennet Yee.
email bsy.

Don't make me hand over my privacy keys!