Sciweavers

CHES
2001
Springer

Attacks on Cryptoprocessor Transaction Sets

14 years 4 months ago
Attacks on Cryptoprocessor Transaction Sets
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two cryptographic keys. Data protected with one key can then be abused by manipulation using the other key. Meet in the middle attacks work by generating a large number of unknown keys of the same type, thus reducing the key space that must be searched to discover the value of one of the keys in the type. Design heuristics are presented to avoid these attacks and other common errors.
Mike Bond
Added 28 Jul 2010
Updated 28 Jul 2010
Type Conference
Year 2001
Where CHES
Authors Mike Bond
Comments (0)