SIKA at TU München | Flashcards & Summaries

Suggested languages for you:

It looks like you are in the US?
We have a website for your region.

# Lernmaterialien für SIKA an der TU München

Greife auf kostenlose Karteikarten, Zusammenfassungen, Übungsaufgaben und Altklausuren für deinen SIKA Kurs an der TU München zu.

TESTE DEIN WISSEN
Countermeasures on the level of implementation/circuit design idea
Lösung anzeigen
TESTE DEIN WISSEN
Algebraic: -Masking intermediate values - boolean masking -Randomization intermediate values - blinding in RSA Hiding: -Ab initio intermediate values - reduce leakage at source using special circuit styles -Ad hoc intermediate values - add noise to reduce SNR (signal noise ratio) -shuffle independent operations
Lösung ausblenden
TESTE DEIN WISSEN
Which are the steps for Classical Second Order attacks?
Lösung anzeigen
TESTE DEIN WISSEN
1. Preprocessing: use a combination function to combine points of the power trace (ex. : absolute difference, normalized product ... ) 2.Genuine DPA attack: Perform a first-order DPA attack on the pre-processed power trace.
Lösung ausblenden
TESTE DEIN WISSEN
Which element of the security pyramid has the most abstract level
Lösung anzeigen
TESTE DEIN WISSEN
Apps
Lösung ausblenden
TESTE DEIN WISSEN
Countermeasures on the level of cryptographic primitives
Lösung anzeigen
TESTE DEIN WISSEN
Research just getting started. Crypto primitives are developed. Assumption: The leakage of the key is bounded (the key can be used at least once without revealing the entire key to the attacker.
Lösung ausblenden
TESTE DEIN WISSEN
If the correlation is reduced by square(2) how much the number of traces is changed?
Lösung anzeigen
TESTE DEIN WISSEN
The number of traces is doubled.
Lösung ausblenden
TESTE DEIN WISSEN
Which are the conditions that fulfill the scope of masking against DPA?
Lösung anzeigen
TESTE DEIN WISSEN
1. Masks are uniformly distributed. 2.There is no simultaneous power consumption of the masked value and the mask. 3.The implementation is done carefully
Lösung ausblenden
TESTE DEIN WISSEN
What is DPA?
Lösung anzeigen
TESTE DEIN WISSEN
DPA is a statistical method for analyzing sets of measurements to identify data-dependent correlations
Lösung ausblenden
TESTE DEIN WISSEN
What is the solution for DPA when attacking multiple pair of bits?
Lösung anzeigen
TESTE DEIN WISSEN
Linear Coreelation Coefficient = CPA (Pearson's Correlation Coefficient)
Lösung ausblenden
TESTE DEIN WISSEN
Mention the layers of the security pyramid (abstraction level).
Lösung anzeigen
TESTE DEIN WISSEN
Physical security of implementation: -Semiconductor Physics -Circuit Design/Logic Styles -Basic Arithmetic Units Cryptography: -Crypto Primitives -Protocols Apps
Lösung ausblenden
TESTE DEIN WISSEN
Specify the element of the security pyramid from the less abstract to more abstract.
Lösung anzeigen
TESTE DEIN WISSEN
Semiconductor Circuit design / logic style Basic Arithmetic Units Crypto Primitives Protocols Apps
Lösung ausblenden
TESTE DEIN WISSEN
What exploits DPA?
Lösung anzeigen
TESTE DEIN WISSEN
The power consumption of processing of intermediate values in crypto-algorithm.
Lösung ausblenden
TESTE DEIN WISSEN
What does the strongest attacks on AES require to reveal the entire key?
Lösung anzeigen
TESTE DEIN WISSEN
Require either: -two pair of ciphertext/faulty text-pairs -one ciphertext/faulty text pair and the corresponding plaintext
Lösung ausblenden
• 445224 Karteikarten
• 10197 Studierende
• 441 Lernmaterialien

## Beispielhafte Karteikarten für deinen SIKA Kurs an der TU München - von Kommilitonen auf StudySmarter erstellt!

Q:
Countermeasures on the level of implementation/circuit design idea
A:
Algebraic: -Masking intermediate values - boolean masking -Randomization intermediate values - blinding in RSA Hiding: -Ab initio intermediate values - reduce leakage at source using special circuit styles -Ad hoc intermediate values - add noise to reduce SNR (signal noise ratio) -shuffle independent operations
Q:
Which are the steps for Classical Second Order attacks?
A:
1. Preprocessing: use a combination function to combine points of the power trace (ex. : absolute difference, normalized product ... ) 2.Genuine DPA attack: Perform a first-order DPA attack on the pre-processed power trace.
Q:
Which element of the security pyramid has the most abstract level
A:
Apps
Q:
Countermeasures on the level of cryptographic primitives
A:
Research just getting started. Crypto primitives are developed. Assumption: The leakage of the key is bounded (the key can be used at least once without revealing the entire key to the attacker.
Q:
If the correlation is reduced by square(2) how much the number of traces is changed?
A:
The number of traces is doubled.
Q:
Which are the conditions that fulfill the scope of masking against DPA?
A:
1. Masks are uniformly distributed. 2.There is no simultaneous power consumption of the masked value and the mask. 3.The implementation is done carefully
Q:
What is DPA?
A:
DPA is a statistical method for analyzing sets of measurements to identify data-dependent correlations
Q:
What is the solution for DPA when attacking multiple pair of bits?
A:
Linear Coreelation Coefficient = CPA (Pearson's Correlation Coefficient)
Q:
Mention the layers of the security pyramid (abstraction level).
A:
Physical security of implementation: -Semiconductor Physics -Circuit Design/Logic Styles -Basic Arithmetic Units Cryptography: -Crypto Primitives -Protocols Apps
Q:
Specify the element of the security pyramid from the less abstract to more abstract.
A:
Semiconductor Circuit design / logic style Basic Arithmetic Units Crypto Primitives Protocols Apps
Q:
What exploits DPA?
A:
The power consumption of processing of intermediate values in crypto-algorithm.
Q:
What does the strongest attacks on AES require to reveal the entire key?
A:
Require either: -two pair of ciphertext/faulty text-pairs -one ciphertext/faulty text pair and the corresponding plaintext

### Erstelle und finde Lernmaterialien auf StudySmarter.

Greife kostenlos auf tausende geteilte Karteikarten, Zusammenfassungen, Altklausuren und mehr zu.

## Das sind die beliebtesten StudySmarter Kurse für deinen Studiengang SIKA an der TU München

Für deinen Studiengang SIKA an der TU München gibt es bereits viele Kurse, die von deinen Kommilitonen auf StudySmarter erstellt wurden. Karteikarten, Zusammenfassungen, Altklausuren, Übungsaufgaben und mehr warten auf dich!

## Das sind die beliebtesten SIKA Kurse im gesamten StudySmarter Universum

##### SIM

Universität Giessen

##### SiWa

Universität Stuttgart