In: Tatra Mountains Mathematical Publications, vol. 29, no. 3
Joanna Kucner - Mirosław Kutyłowski
Rok, strany: 2004, 57 - 67
Devices implementing cryptographic operations such as electronic signatures can leak information on secret data using kleptography, even if they are claimed to be secure. Testing these devices is extremely hard, since on one hand a major design goal is to disable external access to the device, and on the other hand the output of a contaminated device might be indistinguishable from the legitimate one if a secret data is unknown. We discuss a couple of simple and cheap techniques that may be used as a defense against such threats.
Kucner, J., Kutyłowski, M. 2004. How to use un-trusty cryptographic devices. In Tatra Mountains Mathematical Publications, vol. 29, no.3, pp. 57-67. 1210-3195.
Kucner, J., Kutyłowski, M. (2004). How to use un-trusty cryptographic devices. Tatra Mountains Mathematical Publications, 29(3), 57-67. 1210-3195.