{"id":423522,"date":"2024-10-20T06:46:55","date_gmt":"2024-10-20T06:46:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-23-30433272-dc-2023\/"},"modified":"2024-10-26T12:43:48","modified_gmt":"2024-10-26T12:43:48","slug":"bsi-23-30433272-dc-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-23-30433272-dc-2023\/","title":{"rendered":"BSI 23\/30433272 DC 2023"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
7<\/td>\nForeword <\/td>\n<\/tr>\n
8<\/td>\nIntroduction <\/td>\n<\/tr>\n
11<\/td>\n1 Scope
2 Normative references
3 Terms and definitions <\/td>\n<\/tr>\n
13<\/td>\n4 Symbols and abbreviated terms
5 Document organization <\/td>\n<\/tr>\n
14<\/td>\n6 Non-invasive attack methods <\/td>\n<\/tr>\n
17<\/td>\n7 Non-invasive attack test methods
7.1 Introduction
7.2 Test strategy
7.3 Side-channel analysis workflow
7.3.1 Core test flow <\/td>\n<\/tr>\n
18<\/td>\n7.3.2 Side-channel resistance test framework <\/td>\n<\/tr>\n
19<\/td>\n7.3.3 Required vendor information <\/td>\n<\/tr>\n
20<\/td>\n7.3.4 TA leakage analysis <\/td>\n<\/tr>\n
21<\/td>\n7.3.5 SPA\/SEMA Leakage Analysis <\/td>\n<\/tr>\n
22<\/td>\n7.3.6 DPA\/DEMA Leakage Analysis <\/td>\n<\/tr>\n
23<\/td>\n8 Side-channel analysis of symmetric-key cryptosystems
8.1 Introduction
8.2 Timing attacks <\/td>\n<\/tr>\n
24<\/td>\n8.3 SPA\/SEMA
8.3.1 Attacks on key derivation process
8.3.2 Collision attacks
8.4 DPA\/DEMA <\/td>\n<\/tr>\n
26<\/td>\n9 ASCA on asymmetric cryptography
9.1 Introduction <\/td>\n<\/tr>\n
28<\/td>\n9.2 Detailed side-channel resistance test framework <\/td>\n<\/tr>\n
29<\/td>\n9.3 Timing attacks
9.3.1 Introduction
9.3.2 Standard timing analysis <\/td>\n<\/tr>\n
30<\/td>\n9.3.3 Micro-architectural timing analysis
9.4 SPA\/SEMA
9.4.1 Introduction
9.4.2 Standard SPA\/SEMA <\/td>\n<\/tr>\n
31<\/td>\n9.4.3 Markov SPA\/SEMA
9.5 DPA\/DEMA
9.5.1 Introduction
9.5.2 Standard DPA\/DEMA
9.5.3 Address-Bit DPA\/DEMA <\/td>\n<\/tr>\n
33<\/td>\nAnnex\u20acA (normative) Non-invasive attack mitigation pass\/fail test metrics <\/td>\n<\/tr>\n
36<\/td>\nAnnex\u20acB (informative) Requirements for measurement apparatus <\/td>\n<\/tr>\n
37<\/td>\nAnnex\u20acC (normative) Associated security functions <\/td>\n<\/tr>\n
39<\/td>\nAnnex\u20acD (informative) Emerging attacks <\/td>\n<\/tr>\n
41<\/td>\nAnnex\u20acE (informative) Quality criteria for measurement setups <\/td>\n<\/tr>\n
43<\/td>\nAnnex\u20acF (informative) Chosen-input method to accelerate leakage analysis <\/td>\n<\/tr>\n
44<\/td>\nAnnex\u20acG (informative) Reasons that a side-channel is assessed as not measurable <\/td>\n<\/tr>\n
45<\/td>\nAnnex\u20acH (informative) Information about leakage location in relation to algorithm time <\/td>\n<\/tr>\n
46<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

BS ISO\/IEC 17825. Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n49<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":423532,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-423522","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/423522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/423532"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=423522"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=423522"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=423522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}