P?ísp?vek k postranním kanál?m
14.06.2004In general, cryptographic hardware designers only implement non-cryptographic functions and cryptographic primitives, to prevent limiting the possible cryptosystems that may be implemented by use of their hardware.These two types of functions are later made available as functions of Application Programming Iterfaces (APIs).After the introduction of both timing-and power-analysis attacks,more care is being taken with the implementation of those functions that are displaced by the cryptographic hardware's APIs.However, even though the current implementations of those functions claim to be secure against side-channel attacks,it does ot mean that the cryptosystems that define the use of those functions are also secure against side-channel attacks.
Zdroj: http://www.mind-security.com/files/esca1_short.pdfAutor: VK