BSI 23/30433272 DC 2023
$13.70
BS ISO/IEC 17825. Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
Published By | Publication Date | Number of Pages |
BSI | 2023 | 49 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
13 | 4 Symbols and abbreviated terms 5 Document organization |
14 | 6 Non-invasive attack methods |
17 | 7 Non-invasive attack test methods 7.1 Introduction 7.2 Test strategy 7.3 Side-channel analysis workflow 7.3.1 Core test flow |
18 | 7.3.2 Side-channel resistance test framework |
19 | 7.3.3 Required vendor information |
20 | 7.3.4 TA leakage analysis |
21 | 7.3.5 SPA/SEMA Leakage Analysis |
22 | 7.3.6 DPA/DEMA Leakage Analysis |
23 | 8 Side-channel analysis of symmetric-key cryptosystems 8.1 Introduction 8.2 Timing attacks |
24 | 8.3 SPA/SEMA 8.3.1 Attacks on key derivation process 8.3.2 Collision attacks 8.4 DPA/DEMA |
26 | 9 ASCA on asymmetric cryptography 9.1 Introduction |
28 | 9.2 Detailed side-channel resistance test framework |
29 | 9.3 Timing attacks 9.3.1 Introduction 9.3.2 Standard timing analysis |
30 | 9.3.3 Micro-architectural timing analysis 9.4 SPA/SEMA 9.4.1 Introduction 9.4.2 Standard SPA/SEMA |
31 | 9.4.3 Markov SPA/SEMA 9.5 DPA/DEMA 9.5.1 Introduction 9.5.2 Standard DPA/DEMA 9.5.3 Address-Bit DPA/DEMA |
33 | Annex€A (normative) Non-invasive attack mitigation pass/fail test metrics |
36 | Annex€B (informative) Requirements for measurement apparatus |
37 | Annex€C (normative) Associated security functions |
39 | Annex€D (informative) Emerging attacks |
41 | Annex€E (informative) Quality criteria for measurement setups |
43 | Annex€F (informative) Chosen-input method to accelerate leakage analysis |
44 | Annex€G (informative) Reasons that a side-channel is assessed as not measurable |
45 | Annex€H (informative) Information about leakage location in relation to algorithm time |
46 | Bibliography |