On the Importance of Checking Cryptographic Protocols for Faults View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2001-07-13

AUTHORS

Dan Boneh , Richard A. DeMillo , Richard J. Lipton

ABSTRACT

We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.

PAGES

37-51

References to SciGraph publications

  • 1988-06. Zero-knowledge proofs of identity in JOURNAL OF CRYPTOLOGY
  • 1991-01. Efficient signature generation by smart cards in JOURNAL OF CRYPTOLOGY
  • Book

    TITLE

    Advances in Cryptology — EUROCRYPT ’97

    ISBN

    978-3-540-62975-7
    978-3-540-69053-5

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4

    DOI

    http://dx.doi.org/10.1007/3-540-69053-0_4

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1024405218


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "name": [
                "Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Boneh", 
            "givenName": "Dan", 
            "id": "sg:person.011401165440.58", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011401165440.58"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ"
              ], 
              "type": "Organization"
            }, 
            "familyName": "DeMillo", 
            "givenName": "Richard A.", 
            "id": "sg:person.01254417454.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01254417454.96"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Lipton", 
            "givenName": "Richard J.", 
            "id": "sg:person.010133373171.27", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010133373171.27"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/bf02351717", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001094212", 
              "https://doi.org/10.1007/bf02351717"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf02351717", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1001094212", 
              "https://doi.org/10.1007/bf02351717"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00196725", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043691009", 
              "https://doi.org/10.1007/bf00196725"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bf00196725", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043691009", 
              "https://doi.org/10.1007/bf00196725"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2001-07-13", 
        "datePublishedReg": "2001-07-13", 
        "description": "We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.", 
        "editor": [
          {
            "familyName": "Fumy", 
            "givenName": "Walter", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/3-540-69053-0_4", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-540-62975-7", 
            "978-3-540-69053-5"
          ], 
          "name": "Advances in Cryptology \u2014 EUROCRYPT \u201997", 
          "type": "Book"
        }, 
        "name": "On the Importance of Checking Cryptographic Protocols for Faults", 
        "pagination": "37-51", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/3-540-69053-0_4"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "7444d096032ee62dcf107b65541bbee47f7b1ac4adcafac92a5def40246bdff5"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1024405218"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/3-540-69053-0_4", 
          "https://app.dimensions.ai/details/publication/pub.1024405218"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T05:22", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000339_0000000339/records_109514_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F3-540-69053-0_4"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-69053-0_4'


     

    This table displays all metadata directly associated to this object as RDF triples.

    90 TRIPLES      23 PREDICATES      28 URIs      19 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/3-540-69053-0_4 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N7de309af30f84f8182b02132ed24841f
    4 schema:citation sg:pub.10.1007/bf00196725
    5 sg:pub.10.1007/bf02351717
    6 schema:datePublished 2001-07-13
    7 schema:datePublishedReg 2001-07-13
    8 schema:description We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. We also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.
    9 schema:editor Ndc587b53b83f42fc965c4a7e946cfac0
    10 schema:genre chapter
    11 schema:inLanguage en
    12 schema:isAccessibleForFree true
    13 schema:isPartOf Nd9fc9f10c1f94171b3589d5cc1066981
    14 schema:name On the Importance of Checking Cryptographic Protocols for Faults
    15 schema:pagination 37-51
    16 schema:productId N3e20b0af3c1f4acd9b956c4d811b4388
    17 N4899b558defd4b5fae662d79fb8b476c
    18 N88d79d5f9e9147419d138057f1f49b3c
    19 schema:publisher N621c26d0d02e4c209ae1ce4656b088ef
    20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024405218
    21 https://doi.org/10.1007/3-540-69053-0_4
    22 schema:sdDatePublished 2019-04-16T05:22
    23 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    24 schema:sdPublisher N83745914fb774ad58ff5fc46d098019e
    25 schema:url https://link.springer.com/10.1007%2F3-540-69053-0_4
    26 sgo:license sg:explorer/license/
    27 sgo:sdDataset chapters
    28 rdf:type schema:Chapter
    29 N1f70b894a3dd413e90e884c16b359b13 rdf:first sg:person.010133373171.27
    30 rdf:rest rdf:nil
    31 N3e20b0af3c1f4acd9b956c4d811b4388 schema:name doi
    32 schema:value 10.1007/3-540-69053-0_4
    33 rdf:type schema:PropertyValue
    34 N4899b558defd4b5fae662d79fb8b476c schema:name dimensions_id
    35 schema:value pub.1024405218
    36 rdf:type schema:PropertyValue
    37 N5e158f4aa9b04a40b8a8c43ab2b1994b schema:name Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ
    38 rdf:type schema:Organization
    39 N6194bd211c8d49139fb4e1d4b5b694f7 schema:familyName Fumy
    40 schema:givenName Walter
    41 rdf:type schema:Person
    42 N621c26d0d02e4c209ae1ce4656b088ef schema:location Berlin, Heidelberg
    43 schema:name Springer Berlin Heidelberg
    44 rdf:type schema:Organisation
    45 N697727fe4a994e57b049f80793bdfc85 schema:name Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ
    46 rdf:type schema:Organization
    47 N7de309af30f84f8182b02132ed24841f rdf:first sg:person.011401165440.58
    48 rdf:rest Nfc8b3c1a15bb4d46baa8e9783eec4702
    49 N83745914fb774ad58ff5fc46d098019e schema:name Springer Nature - SN SciGraph project
    50 rdf:type schema:Organization
    51 N88d79d5f9e9147419d138057f1f49b3c schema:name readcube_id
    52 schema:value 7444d096032ee62dcf107b65541bbee47f7b1ac4adcafac92a5def40246bdff5
    53 rdf:type schema:PropertyValue
    54 N90c771f5391742df9f3c7a1baaa5cf08 schema:name Math and Cryptography Research Group, Bellcore, 445 South Street, 07960, Morristown, NJ
    55 rdf:type schema:Organization
    56 Nd9fc9f10c1f94171b3589d5cc1066981 schema:isbn 978-3-540-62975-7
    57 978-3-540-69053-5
    58 schema:name Advances in Cryptology — EUROCRYPT ’97
    59 rdf:type schema:Book
    60 Ndc587b53b83f42fc965c4a7e946cfac0 rdf:first N6194bd211c8d49139fb4e1d4b5b694f7
    61 rdf:rest rdf:nil
    62 Nfc8b3c1a15bb4d46baa8e9783eec4702 rdf:first sg:person.01254417454.96
    63 rdf:rest N1f70b894a3dd413e90e884c16b359b13
    64 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    65 schema:name Information and Computing Sciences
    66 rdf:type schema:DefinedTerm
    67 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    68 schema:name Data Format
    69 rdf:type schema:DefinedTerm
    70 sg:person.010133373171.27 schema:affiliation N5e158f4aa9b04a40b8a8c43ab2b1994b
    71 schema:familyName Lipton
    72 schema:givenName Richard J.
    73 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010133373171.27
    74 rdf:type schema:Person
    75 sg:person.011401165440.58 schema:affiliation N697727fe4a994e57b049f80793bdfc85
    76 schema:familyName Boneh
    77 schema:givenName Dan
    78 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011401165440.58
    79 rdf:type schema:Person
    80 sg:person.01254417454.96 schema:affiliation N90c771f5391742df9f3c7a1baaa5cf08
    81 schema:familyName DeMillo
    82 schema:givenName Richard A.
    83 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01254417454.96
    84 rdf:type schema:Person
    85 sg:pub.10.1007/bf00196725 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043691009
    86 https://doi.org/10.1007/bf00196725
    87 rdf:type schema:CreativeWork
    88 sg:pub.10.1007/bf02351717 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001094212
    89 https://doi.org/10.1007/bf02351717
    90 rdf:type schema:CreativeWork
     




    Preview window. Press ESC to close (or click here)


    ...