Tam­per re­sis­tant crypto im­ple­men­ta­tions

The pro­tec­tion goals con­fi­den­tial­ity, data in­tegrity and au­then­tic­ity can be re­al­ized with the help of cryp­to­graphic al­go­rithms. To achieve this, it is es­sen­tial to keep the used keys se­cret. Al­though these can pos­si­bly be de­ter­mined by an­a­lyz­ing phys­i­cal pa­ra­me­ters such as en­ergy con­sump­tion or elec­tro­mag­netic ra­di­a­tion of the im­ple­men­ta­tions, well known as side-​channel-attacks. Es­pe­cially if the de­vices are phys­i­cally un­pro­tected, these at­tacks are rel­e­vant, e.g. for crit­i­cal in­fra­struc­tures. In order to pre­vent this, dif­fer­ent meth­ods of at­tack are in­ves­ti­gated, i.e. sta­tis­ti­cal and AI based meth­ods for the ex­trac­tion of keys from mea­sured val­ues. For this, a suit­able mea­sure­ment lab in­clud­ing a laser sta­tion for fault in­jec­tions is avail­able. Based on the knowl­edge gained in this way, the im­ple­men­ta­tions are hard­ened against such at­tacks. The goal is to de­velop a cor­re­spond­ing de­sign method­ol­ogy. The re­sults achieved so far have been in­cor­po­rated in nu­mer­ous pub­li­ca­tions and 10 granted patents.

Re­search Top­ics

The website is designed for modern browsers. Please use a current browser.