Sciweavers

ACISP
2000
Springer

Cryptanalysis of the m-Permutation Protection Schemes

13 years 9 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protection scheme against the EEPROM modification attack. At ACISP'99, Fung and Gray pointed out that in their original scheme, some secret key with too small or too large Hamming weight could be recovered easily. Then they proposed a revised −m permutation protection scheme and claimed that their revised scheme does not leak any information of the secret key. In this paper, we break completely both the original and the revised −m permutation protection schemes. The original scheme is broken with about n2 log2 devices from the same batch and about nmn ××+ )2log3( 2 probes ( n is the length of the secret key and m is the amount of permutations). The revised −m permutation protection scheme is more vulnerable than the original one. It could be broken with only one device and about 3/3 nm× probes.
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
Added 01 Aug 2010
Updated 01 Aug 2010
Type Conference
Year 2000
Where ACISP
Authors Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
Comments (0)