{"id":423522,"date":"2024-10-20T06:46:55","date_gmt":"2024-10-20T06:46:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30433272-dc-2023\/"},"modified":"2024-10-26T12:43:48","modified_gmt":"2024-10-26T12:43:48","slug":"bsi-23-30433272-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30433272-dc-2023\/","title":{"rendered":"BSI 23\/30433272 DC 2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4 Symbols and abbreviated terms 5 Document organization <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 Non-invasive attack methods <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7 Non-invasive attack test methods 7.1 Introduction 7.2 Test strategy 7.3 Side-channel analysis workflow 7.3.1 Core test flow <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.3.2 Side-channel resistance test framework <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.3.3 Required vendor information <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 7.3.4 TA leakage analysis <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 7.3.5 SPA\/SEMA Leakage Analysis <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.3.6 DPA\/DEMA Leakage Analysis <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 8 Side-channel analysis of symmetric-key cryptosystems 8.1 Introduction 8.2 Timing attacks <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 8.3 SPA\/SEMA 8.3.1 Attacks on key derivation process 8.3.2 Collision attacks 8.4 DPA\/DEMA <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9 ASCA on asymmetric cryptography 9.1 Introduction <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.2 Detailed side-channel resistance test framework <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.3 Timing attacks 9.3.1 Introduction 9.3.2 Standard timing analysis <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.3.3 Micro-architectural timing analysis 9.4 SPA\/SEMA 9.4.1 Introduction 9.4.2 Standard SPA\/SEMA <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 9.4.3 Markov SPA\/SEMA 9.5 DPA\/DEMA 9.5.1 Introduction 9.5.2 Standard DPA\/DEMA 9.5.3 Address-Bit DPA\/DEMA <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex\u20acA (normative) Non-invasive attack mitigation pass\/fail test metrics <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | Annex\u20acB (informative) Requirements for measurement apparatus <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex\u20acC (normative) Associated security functions <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex\u20acD (informative) Emerging attacks <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex\u20acE (informative) Quality criteria for measurement setups <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex\u20acF (informative) Chosen-input method to accelerate leakage analysis <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | Annex\u20acG (informative) Reasons that a side-channel is assessed as not measurable <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex\u20acH (informative) Information about leakage location in relation to algorithm time <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 17825. Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules<\/b><\/p>\n |