CSE 227: Lecture 2
The topics covered in this lecture are
Differential Timing Analysis,
Differential Power Analysis,
Euler phi function. Encrypt/Decrypt.
Applications: smart card-based credit cards; satellite television decoding.
Used to hold secret key of public key algorithm.
Standard cryptographic algorithm analysis do not take physical possession
Peeling a chip.
Improper operating voltage, clock.
Security vulnerability found in
device driver. Information leak.
search CSE |
bsy's home page |
pgp certserver |
firstname.lastname@example.org, last updated Thu Jan 9 20:50:17 PST 2003. Copyright 2003 Bennet Yee.