Tamper resistance of AES : Models, attacks and countermeasures / Volker Krummel. 2007
Content
- Introduction
- The Advanced Encryption Standard (AES)
- Symmetric Block Ciphers
- Basic Algebraic Structures of AES
- Representation of Data
- The Finite Field F2[x]/"426830A x8+x4+x3+x+1"526930B
- The Ring F2[x]/"426830A x8+1"526930B
- The Ring R=F256[y]/"426830A y4+1"526930B
- The Standard Implementation of AES
- The Fast Implementation of AES
- Security and Side Channel Attacks
- Provably Secure Randomization of Cryptographic Algorithms
- Security Model
- Masking AES
- Perfectly Masking AES against Order-1 Adversaries
- Implementation and Costs
- Order-d Perfectly Masking
- Conclusions
- Fault Based Collision Attacks
- The Concept of Fault Attacks
- The Concept of Collision Attacks
- New Fault Model
- Fault Based Collision Attacks on AES
- Conclusion
- Cache Behavior Attacks (CBAs)
- Cache Mechanism and Technical Background
- Security Models for CBAs
- Fundamental Model for CBAs
- Time Driven CBA
- Trace Driven CBA
- Access Driven CBA
- Extending the Threat Model for Access Driven CBAs
- Access Driven CBAs on AES
- General Methods to Thwart CBAs
- Information Leakage and Resistance
- Information Leakage and Resistance of Selected Implementations
- Countermeasures Based on Permutations
- Summary of Countermeasures and Open Problems
- Sbox Tables T0,…, T4 of AES
- Decompositions of the AES Sbox
