Please use this identifier to cite or link to this item:
Title: Exploiting cryptographic architectures over hardware vs. software implementations
Alternative title / Subtitle: advantages and trade-offs
Authors: Σκλάβος, Νικόλαος
Τούλιου, Κ.
Ευσταθίου, Κωνσταντίνος Η.
Item type: Conference publication
Conference Item Type: Full Paper
Keywords: Reverse engineering;Random number generators;Software - hardware cryptographic implementations;Λογισμικό - κρυπτογραφικές εφαρμογές;Memory access;Πρόσβαση στη μνήμη;Αντίστροφη μηχανική;Timing and power analysis attacks;OS vulnerabilities;Τρωτά σημεία OS;Γεννήτριες τυχαίων αριθμών;Key storage;Βασική αποθήκευση
Subjects: Computer science
Computer programming
Issue Date: 17-Mar-2015
Date of availability: 17-Mar-2015
Abstract: Cryptographic modules can be implemented in both hardware and software. Although softwarecryptographic implementations are cost-effective and more flexible, they seem to provide a much lower levelof security in relation to their hardware equivalents. The uncontrolled memory access, the vulnerabilitiesimposed by the OS and the facility of modifying software implementations are some of the security barriers ofsoftware cryptographic modules. This works deals with the exploitation of security architectures via softwareand hardware implementations. Especially it is centers in the advantages and the trade-offs of each one of thetwo alternatives integration approaches.
Language: English
Conference: 5th International Conference on Applications of Electrical Engineering(AEE ‘06),
Access scheme: Publicly accessible
License: Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες
Appears in Collections:Αποτελέσματα ερευνητικών έργων

Files in This Item:
There are no files associated with this item.

This item is licensed under a Creative Commons License Creative Commons