Cryptanalysis of the m-permutation protection schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secr...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2000
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1111 https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2110 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-21102022-02-18T05:13:02Z Cryptanalysis of the m-permutation protection schemes WU, Hongjun BAO, Feng YE, Dingfeng DENG, Robert H. Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secret key with too small or too large Hamming weight could be recovered easily. Then they proposed a revised m- permutation protection scheme and claimed that their revised scheme does not leak any information of the secret key. In this paper, we break completely both the original and the revised m-permutation protection schemes. The original scheme is broken with about 2log2 n devices from the same batch and about (3log2 n +2 ) ×m ×n probes (n is the length of the secret key and m is the amount of permutations). The revised m-permutation protection scheme is more vulnerable than the original one. It could be broken with only one device and about m ×n 3/3 probes. 2000-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1111 info:doi/10.1007/10718964_9 https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Public key cryptography Data privacy Information protection Secrecy protection Security key Computer security Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Public key cryptography Data privacy Information protection Secrecy protection Security key Computer security Information Security |
spellingShingle |
Public key cryptography Data privacy Information protection Secrecy protection Security key Computer security Information Security WU, Hongjun BAO, Feng YE, Dingfeng DENG, Robert H. Cryptanalysis of the m-permutation protection schemes |
description |
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP ’98, Fung and Gray proposed an m-permutation protection scheme against the EEPROM modification attack. At ACISP ’99, Fung and Gray pointed out that in their original scheme, a secret key with too small or too large Hamming weight could be recovered easily. Then they proposed a revised m- permutation protection scheme and claimed that their revised scheme does not leak any information of the secret key. In this paper, we break completely both the original and the revised m-permutation protection schemes. The original scheme is broken with about 2log2 n devices from the same batch and about (3log2 n +2 ) ×m ×n probes (n is the length of the secret key and m is the amount of permutations). The revised m-permutation protection scheme is more vulnerable than the original one. It could be broken with only one device and about m ×n 3/3 probes. |
format |
text |
author |
WU, Hongjun BAO, Feng YE, Dingfeng DENG, Robert H. |
author_facet |
WU, Hongjun BAO, Feng YE, Dingfeng DENG, Robert H. |
author_sort |
WU, Hongjun |
title |
Cryptanalysis of the m-permutation protection schemes |
title_short |
Cryptanalysis of the m-permutation protection schemes |
title_full |
Cryptanalysis of the m-permutation protection schemes |
title_fullStr |
Cryptanalysis of the m-permutation protection schemes |
title_full_unstemmed |
Cryptanalysis of the m-permutation protection schemes |
title_sort |
cryptanalysis of the m-permutation protection schemes |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2000 |
url |
https://ink.library.smu.edu.sg/sis_research/1111 https://ink.library.smu.edu.sg/context/sis_research/article/2110/viewcontent/Wu2000_CryptanalysisOfTheMPerMutation_pv.pdf |
_version_ |
1770570859758485504 |