Chip flaws could provide a way to beat encryption

Kamath, John-Paul
November 2007
Computer Weekly;11/27/2007, p16
Trade Publication
The article reports that millions of computers running RSA-based security programs could be left vulnerable to hacking attacks if processor manufacturers are not careful with their design. According to Adi Shamir, founder of the RSA standard, said that flaws in processor designs could be targeted by hackers to overcome encryption techniques in RSA-based security programs, which are used worldwide to conduct online payments and transactions. Shamir revealed that causing a calculation error could make it possible for an attacker to break the protection of public key cryptography.


Related Articles

  • Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols. Junghyun Nam; Kim-Kwang Raymond Choo; Juryon Paik; Dongho Won // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p47 

    Protocols for password-based authenticated key exchange (PAKE) enable two or more parties communicating over a public network to build a secure communication channel using their easy-to-remember passwords. However, off-line dictionary attacks have always been a major security concern in...

  • A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions. Lindell, Yehuda // Journal of Cryptology;Summer2006, Vol. 19 Issue 3, p359 

    In this paper we present a simpler construction of a public-key encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapdoor permutations. We build on previous works of Sahai and De Santis et al. and construct a scheme that we believe is the...

  • Cryptanalysis of Hwang et al.'s Improved Encryption Scheme. Dezhi Gao; Xiangqian Liang // Journal of Systems Science & Information;Jun2009, Vol. 7 Issue 2, p159 

    Recently, Tseng et al. proposed authenticated encryption scheme with message recovery using self-certified public keys. Hwang et al. proposed an attack to show that the Tseng et al.'s scheme was not secure. And Hwang et al. proposed an improved scheme and claimed to that the new scheme satisfy...

  • SUPPORTING NATIONAL PUBLIC KEY INFRASTRUCTURES USING SMART CARDS. Dos Santos, A. L. M.; Torrey, M. E.; El Sheshai, A. // International Journal of Computers & Applications;2005, Vol. 27 Issue 1, p35 

    National public key infrastructures have been proposed by governmental entities all over the world. Such infrastructures can be used to further build functionalities enabling e-government services. This article describes protocols for certificate generation and revocation that are appropriate...

  • Public-key encryption based on generalized synchronization of coupled map lattices. Xingang Wang; Xiaofeng Gong; Meng Zhan; Choy Heng Lai // Chaos;Jun2005, Vol. 15 Issue 2, p023109 

    Currently used public-key cryptosystems are based on difficulties in solving certain numeric theoretic problems, in which the way to predict the private key from the knowledge of the public key is computationally infeasible. Here we propose a method of constructing public-key cryptosystems by...

  • Breaking four mix-related schemes based on Universal Re-encryption. Danezis, George // International Journal of Information Security;Oct2007, Vol. 6 Issue 6, p393 

    Universal Re-encryption allows El-Gamal ciphertexts to be re-encrypted without knowledge of their corresponding public keys. This has made it an enticing building block for anonymous communications protocols. In this work we analyze four schemes related to mix networks that make use of Universal...

  • Privacy-aware searching with oblivious term matching for cloud storage. Pervez, Zeeshan; Awan, Ammar; Khattak, Asad; Lee, Sungyoung; Huh, Eui-Nam // Journal of Supercomputing;Feb2013, Vol. 63 Issue 2, p538 

    Encryption ensures confidentiality of the data outsourced to cloud storage services. Searching the encrypted data enables subscribers of a cloud storage service to access only relevant data, by defining trapdoors or evaluating search queries on locally stored indexes. However, these approaches...

  • New technology could simplify encryption management.  // Secured Lender;Nov/Dec2006, Vol. 62 Issue 6, p146 

    The article provides information on identity-based encryption (IBE) system designed to solve the shortcomings of public key infrastructure (PKI) encryption. A typical PKI requires users to register with a certificate authority to receive a pair of keys that encrypt and decrypt messages. IBE...

  • ELECRONIC INSURANCE SECURITY. Sanayei, Ali; Torkestani, Mohammad Saleh; Ahadi, Pari // Proceedings of the IADIS International Conference on WWW/Interne;Nov2008, p59 

    The low-cost nature of the Internet coupled with the ease of making transactions has led to an explosive growth in ebusiness but trust in this medium is still a major concern. E-security is the foundation that enables trust in e-business. In this sense, main cryptographic aspects of modern...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics