Swipe to navigate through the chapters of this book
In comparison to previous Chapters which studied security of schemes for encryption based on their theoretical, Mathematical properties, this chapter shifts the perspective slightly. As well as reasoning in theory about how secure a scheme is, the premise is that we also need to worry about the physical implementation.
Two examples scenarios are examined. The first deals with guessing passwords: given the basic strategy of trying every password as a starting point, can one do better with some extra information (e.g., execution time) collected passively via a so-called side-channel? The second not only allows passive collection of information, but also active influence over execution: with the ability to tamper with a mobile telephone for example, can one guess the PIN number more easily?
Please log in to get access to this content
To get access to this content you need the following product:
- Picking Digital Pockets
- Springer International Publishing
- Sequence number
- Chapter number