Facebook Instagram Twitter RSS Feed PodBean Back to top on side

How to use un-trusty cryptographic devices

In: Tatra Mountains Mathematical Publications, vol. 29, no. 3
Joanna Kucner - Mirosław Kutyłowski

Details:

Year, pages: 2004, 57 - 67
About article:
Devices implementing cryptographic operations such as electronic signatures can leak information on secret data using kleptography, even if they are claimed to be secure. Testing these devices is extremely hard, since on one hand a major design goal is to disable external access to the device, and on the other hand the output of a contaminated device might be indistinguishable from the legitimate one if a secret data is unknown. We discuss a couple of simple and cheap techniques that may be used as a defense against such threats.
How to cite:
ISO 690:
Kucner, J., Kutyłowski, M. 2004. How to use un-trusty cryptographic devices. In Tatra Mountains Mathematical Publications, vol. 29, no.3, pp. 57-67. 1210-3195.

APA:
Kucner, J., Kutyłowski, M. (2004). How to use un-trusty cryptographic devices. Tatra Mountains Mathematical Publications, 29(3), 57-67. 1210-3195.