|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Extracting Unknown Keys from Unknown Algorithms Encrypting Unknown Fixed Messages and Returning no Results
If you have a question about this talk, please contact Wei Ming Khoo.
In addition to its usual complexity assumptions, cryptography silently assumes that information can be physically protected in a single location. As we now know, real-life devices are not ideal and confidential information leaks through different physical channels. Whilst most aspects of side channel leakage (cryptophthora) are now well understood, no attacks on totally unknown algorithms are known to date. This paper describes such an attack. By totally unknown we mean that no information on the algorithm’s mathematical description (including the plaintext size), the microprocessor or the chip’s power consumption model is available to the attacker.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsArcDigital and CoDE talks at Anglia Ruskin ndk22's list Global Student Education Forum (GSEF) Talk Series
Other talksGeometry of finite quotients of groups Understanding Angiogenesis through Modeling and Asymptotics Mechanisms of Regulation of the histone demethylase LSD1/CoREST complex: from SUMOylation to miRNAs Title: “Are there more polyposis genes to find?” Public Policy Seminar: The Politics of Fiscal Squeeze over Time in the UK - Eternal Verities or a Changing Game? The Anthropocene seen by the Anopheles: fighting malarial mosquitoes with chemicals in modern China, 1910s–1960s