Attacks on Cryptoprocessor Transaction Sets
暂无分享,去创建一个
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two cryptographic keys. Data protected with one key can then be abused by manipulation using the other key. Meet in the middle attacks work by generating a large number of unknown keys of the same type, thus reducing the key space that must be searched to discover the value of one of the keys in the type. Design heuristics are presented to avoid these attacks and other common errors.
[1] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[2] Mike Bond. A Chosen Key Difference Attack on Control Vectors , 2000 .
[3] Ross J. Anderson. The Correctness of Crypto Transaction Sets , 2000, Security Protocols Workshop.
[4] Stephen M. Matyas,et al. A Key-Management Scheme Based on Control Vectors , 1991, IBM Syst. J..
[5] Stephen M. Matyas. Key Handling with Control Vectors , 1991, IBM Syst. J..