Constructing an Oscilloscope with Fault Injection: Simple/Related Fault Attacks on Cryptographic Algorithms

Constructing an Oscilloscope with Fault Injection: Simple/Related Fault Attacks on Cryptographic Algorithms

Is there an inherent connection between passive side-channel analysis and active fault injection? Author | Shuyuan Editor | Pan Qizhi Background Introduction Side-channel analysis of cryptographic algorithms refers to the process of inferring intermediate values of cryptographic operations by collecting and analyzing the physical information leaked by cryptographic chips during computation, thereby recovering the keys. … Read more

Password Cracking and Protection Techniques Based on Persistent Fault Injection

Password Cracking and Protection Techniques Based on Persistent Fault Injection

Project Name: Password Cracking and Protection Techniques Based on Persistent Fault Injection Submitting Unit: School of Information and Electronic Engineering, Cyber Security Center Responsible Person: Zhang Fan 01 Project Overview Research Background: In today’s severe international competition for chips, as China strives to promote chip autonomy and controllability, chip security has become particularly important. Ultimately, … Read more

Method for Continuous Fault Injection in Multi-Failure Scenarios

Method for Continuous Fault Injection in Multi-Failure Scenarios

Exploring New Scenarios for Continuous Fault Attacks Written by | Lu Zeyuan Edited by | Liu Mengdi Background Introduction In 2018, Zhang Fan and others from Zhejiang University attacked a cryptographic system running the AES algorithm based on statistical ideas, termed Persistent Fault Analysis (PFA)[1]. This paper first introduced the concept of continuous faults. Compared … Read more

The King of Backdoors: Discussing Mathematical Backdoors in Encryption Algorithms

The King of Backdoors: Discussing Mathematical Backdoors in Encryption Algorithms

Governments and intelligence agencies strive to control or bypass the encryption protections on data and communications, and creating a backdoor in encryption algorithms is seen as the best way to achieve encryption control. Security researchers often look for vulnerabilities in the implementation of encryption algorithms but do not invest much effort in searching for mathematical … Read more

Research on Data Compliance Business Encryption Algorithms (Part 1)

Research on Data Compliance Business Encryption Algorithms (Part 1)

This article has a total of1,0414 words, recommended reading time18 minutes. Introduction Data compliance business is receiving increasing attention. However, unlike other compliance businesses, data compliance is closely related to information technology and involves a large number of technical concepts. Among these technical concepts, the most difficult to understand is the issue of “encryption algorithms”. … Read more

Understanding the Mysterious DES Encryption Algorithm

Understanding the Mysterious DES Encryption Algorithm

1 Introduction DES algorithm is a common block cipher algorithm proposed by IBM in 1971. The DES algorithm is a typical representative of block ciphers and is also the most widely used symmetric encryption algorithm. This article will detail the principles and implementation process of DES. 1.1 Plaintext Plaintext refers to data that has not … Read more

Overview of Common Cryptographic Algorithms

Overview of Common Cryptographic Algorithms

Privacy protection? It’s not to scare everyone; information is transparent, but we should still try to maintain personal privacy. Today, we will learn about symmetric encryption and asymmetric encryption. First, let’s read this character “钥”, is it pronounced “yao” or “yue”? Check the image below. 1. Symmetric Encryption As the name suggests, in symmetric encryption, … Read more

Introduction to Cryptographic Algorithms

Introduction to Cryptographic Algorithms

Click the blue text to follow! The code used in this article can be obtained from https://github.com/FantasyGao/FantasyGao.github.io.1. The Significance of Cryptographic Algorithms Simply put, the emergence of cryptographic algorithms is to solve the problems of data privacy and security in the Internet of Everything. When we are surfing the web, data is constantly being exchanged … Read more

An Overview of 7 Common Encryption Algorithms and Their Implementations

An Overview of 7 Common Encryption Algorithms and Their Implementations

(Give a star to algorithm enthusiasts, train your programming skills) Source: Zero One Technology Stack blog.csdn.net/baidu_22254181/article/details/82594072 Introduction Digital signatures and information encryption are technologies frequently used in both front-end and back-end development, with application scenarios including user login, transactions, information communication, oauth, etc. Different application scenarios may require the use of different signature encryption algorithms … Read more

ChaCha20 Encryption Algorithm Overview

ChaCha20 Encryption Algorithm Overview

# Technology # Sharing Author / Cabinet Sweeping Monk In encryption algorithms, we often encounter a new type of algorithm called ChaCha20. Now let’s take a look at its features and application scenarios. Salsa20 is a stream cipher algorithm submitted to eSTREAM by Daniel J. Bernstein. It is built on a pseudo-random function based on … Read more