On the Importance of Checking Cryptographic Protocols for Faults View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2001-07-13

AUTHORS

Dan Boneh , Richard A. DeMillo , Richard J. Lipton

ABSTRACT

We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.

PAGES

37-51

References to SciGraph publications

  • 1988-06. Zero-knowledge proofs of identity in JOURNAL OF CRYPTOLOGY
  • 1991-01. Efficient signature generation by smart cards in JOURNAL OF CRYPTOLOGY
  • Book

    TITLE

    Advances in Cryptology — EUROCRYPT ’97

    ISBN

    978-3-540-62975-7
    978-3-540-69053-5

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4

    DOI

    http://dx.doi.org/10.1007/3-540-69053-0_4

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1024405218


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Boneh", 
            "givenName": "Dan", 
            "id": "sg:person.011401165440.58", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011401165440.58"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ"
              ], 
              "type": "Organization"
            }, 
            "familyName": "DeMillo", 
            "givenName": "Richard A.", 
            "id": "sg:person.01254417454.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01254417454.96"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lipton", 
            "givenName": "Richard J.", 
            "id": "sg:person.010133373171.27", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010133373171.27"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bf02351717", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001094212", 
              "https://doi.org/10.1007/bf02351717"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf02351717", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001094212", 
              "https://doi.org/10.1007/bf02351717"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00196725", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043691009", 
              "https://doi.org/10.1007/bf00196725"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00196725", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043691009", 
              "https://doi.org/10.1007/bf00196725"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2001-07-13", 
        "datePublishedReg": "2001-07-13", 
        "description": "We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.", 
        "editor": [
          {
            "familyName": "Fumy", 
            "givenName": "Walter", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/3-540-69053-0_4", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-540-62975-7", 
            "978-3-540-69053-5"
          ], 
          "name": "Advances in Cryptology \u2014 EUROCRYPT \u201997", 
          "type": "Book"
        }, 
        "name": "On the Importance of Checking Cryptographic Protocols for Faults", 
        "pagination": "37-51", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/3-540-69053-0_4"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "7444d096032ee62dcf107b65541bbee47f7b1ac4adcafac92a5def40246bdff5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1024405218"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/3-540-69053-0_4", 
          "https://app.dimensions.ai/details/publication/pub.1024405218"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:22", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000339_0000000339/records_109514_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F3-540-69053-0_4"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'


     

    This table displays all metadata directly associated to this object as RDF triples.

    90 TRIPLES      23 PREDICATES      28 URIs      19 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/3-540-69053-0_4 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N7380a1d8066c46de903993340740ca16
    4 schema:citation sg:pub.10.1007/bf00196725
    5 sg:pub.10.1007/bf02351717
    6 schema:datePublished 2001-07-13
    7 schema:datePublishedReg 2001-07-13
    8 schema:description We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.
    9 schema:editor N2dcec6b057cf44b6978dd9d7897ed97f
    10 schema:genre chapter
    11 schema:inLanguage en
    12 schema:isAccessibleForFree true
    13 schema:isPartOf Nb8a6cd73f4fc48f0abc3d78692200e82
    14 schema:name On the Importance of Checking Cryptographic Protocols for Faults
    15 schema:pagination 37-51
    16 schema:productId N8b095a8ff3d84e57ae9e705d83513be4
    17 N8da2bd272c4b490ab2dd9096c7c81605
    18 Nf61f50a190bc4a9f916a1c86b1dd2dff
    19 schema:publisher Nbb29f8180ca643a094478d26e2f936ac
    20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024405218
    21 https://doi.org/10.1007/3-540-69053-0_4
    22 schema:sdDatePublished 2019-04-16T05:22
    23 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    24 schema:sdPublisher N2fd8a0c1e7d645a79fadbb5dbf321f8d
    25 schema:url https://link.springer.com/10.1007%2F3-540-69053-0_4
    26 sgo:license sg:explorer/license/
    27 sgo:sdDataset chapters
    28 rdf:type schema:Chapter
    29 N1d0543c36e234190883932bbe252661a schema:familyName Fumy
    30 schema:givenName Walter
    31 rdf:type schema:Person
    32 N2dcec6b057cf44b6978dd9d7897ed97f rdf:first N1d0543c36e234190883932bbe252661a
    33 rdf:rest rdf:nil
    34 N2fd8a0c1e7d645a79fadbb5dbf321f8d schema:name Springer Nature - SN SciGraph project
    35 rdf:type schema:Organization
    36 N63ab61d68308437192d8cea90f1d699a rdf:first sg:person.01254417454.96
    37 rdf:rest N9cb4d7ea35804deea784a9b9d7bb658c
    38 N7380a1d8066c46de903993340740ca16 rdf:first sg:person.011401165440.58
    39 rdf:rest N63ab61d68308437192d8cea90f1d699a
    40 N8b095a8ff3d84e57ae9e705d83513be4 schema:name readcube_id
    41 schema:value 7444d096032ee62dcf107b65541bbee47f7b1ac4adcafac92a5def40246bdff5
    42 rdf:type schema:PropertyValue
    43 N8da2bd272c4b490ab2dd9096c7c81605 schema:name doi
    44 schema:value 10.1007/3-540-69053-0_4
    45 rdf:type schema:PropertyValue
    46 N8ff6499192a54296b9c0f9428237417a schema:name Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ
    47 rdf:type schema:Organization
    48 N94b999f4b0ca484d9b5e071285c0bbb6 schema:name Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ
    49 rdf:type schema:Organization
    50 N9cb4d7ea35804deea784a9b9d7bb658c rdf:first sg:person.010133373171.27
    51 rdf:rest rdf:nil
    52 Naee5403198684091a9b40580f3b2b2c9 schema:name Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ
    53 rdf:type schema:Organization
    54 Nb8a6cd73f4fc48f0abc3d78692200e82 schema:isbn 978-3-540-62975-7
    55 978-3-540-69053-5
    56 schema:name Advances in Cryptology — EUROCRYPT ’97
    57 rdf:type schema:Book
    58 Nbb29f8180ca643a094478d26e2f936ac schema:location Berlin, Heidelberg
    59 schema:name Springer Berlin Heidelberg
    60 rdf:type schema:Organisation
    61 Nf61f50a190bc4a9f916a1c86b1dd2dff schema:name dimensions_id
    62 schema:value pub.1024405218
    63 rdf:type schema:PropertyValue
    64 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    65 schema:name Information and Computing Sciences
    66 rdf:type schema:DefinedTerm
    67 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    68 schema:name Data Format
    69 rdf:type schema:DefinedTerm
    70 sg:person.010133373171.27 schema:affiliation N94b999f4b0ca484d9b5e071285c0bbb6
    71 schema:familyName Lipton
    72 schema:givenName Richard J.
    73 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010133373171.27
    74 rdf:type schema:Person
    75 sg:person.011401165440.58 schema:affiliation Naee5403198684091a9b40580f3b2b2c9
    76 schema:familyName Boneh
    77 schema:givenName Dan
    78 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011401165440.58
    79 rdf:type schema:Person
    80 sg:person.01254417454.96 schema:affiliation N8ff6499192a54296b9c0f9428237417a
    81 schema:familyName DeMillo
    82 schema:givenName Richard A.
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01254417454.96
    84 rdf:type schema:Person
    85 sg:pub.10.1007/bf00196725 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043691009
    86 https://doi.org/10.1007/bf00196725
    87 rdf:type schema:CreativeWork
    88 sg:pub.10.1007/bf02351717 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001094212
    89 https://doi.org/10.1007/bf02351717
    90 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...