مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

91
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

An Introduction to Security Enhancement of the Cryptographic Algorithms against Side Channel Attacks Using the Threshold Implementation Approach

Pages

  41-52

Abstract

 In order to establish information security, we need to implement a cryptography algorithm in either the software or the hardware. In 1996, Kocher presented the Side Channel Attacks (SCA) on the cryptography systems in which the leakage of some important information was used. Power analysis is one of these attacks. In order to prevent these kinds of attacks, the designers and implementers presented some countermeasures such as hiding and masking. Afterwards, attackers showed that these countermeasures, especially masking, could not reach the security goals in the presence of Glitch. To resolve this challenge Nikova et al. presented the Threshold Implementation method in 2006. They used three subjects, namely threshold cryptography, hidden share, and multi-party computation in their new countermeasure. In fact, the Threshold Implementation is a kind of masking with some extra features to establish the information security in the presence of Glitch. In the recent years, the National Institute of Standards and Technology (NIST) has started some activities in the field Threshold Implementation. Standardization in this field is the main goal of NIST. In this paper we introduce the Threshold Implementation method as a countermeasure against Side Channel Attacks and review its challenges and advantages in comparison to the previous countermeasures.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    ALIZADEH, J., & GHANBARI, H.. (2021). An Introduction to Security Enhancement of the Cryptographic Algorithms against Side Channel Attacks Using the Threshold Implementation Approach. JOURNAL OF PASSIVE DEFENSE, 12(2 (46) ), 41-52. SID. https://sid.ir/paper/986308/en

    Vancouver: Copy

    ALIZADEH J., GHANBARI H.. An Introduction to Security Enhancement of the Cryptographic Algorithms against Side Channel Attacks Using the Threshold Implementation Approach. JOURNAL OF PASSIVE DEFENSE[Internet]. 2021;12(2 (46) ):41-52. Available from: https://sid.ir/paper/986308/en

    IEEE: Copy

    J. ALIZADEH, and H. GHANBARI, “An Introduction to Security Enhancement of the Cryptographic Algorithms against Side Channel Attacks Using the Threshold Implementation Approach,” JOURNAL OF PASSIVE DEFENSE, vol. 12, no. 2 (46) , pp. 41–52, 2021, [Online]. Available: https://sid.ir/paper/986308/en

    Related Journal Papers

  • No record.
  • Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button