BS ISO/IEC 17825:2024
$189.07
Information technology. Security techniques. Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
Published By | Publication Date | Number of Pages |
BSI | 2024 | 48 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
11 | 4 Symbols and abbreviated terms |
12 | 5 Document organization 6 Non-invasive attack methods |
15 | 7 Non-invasive attack test methods 7.1 General 7.2 Test strategy |
16 | 7.3 Side-channel analysis workflow 7.3.1 Core test flow 7.3.2 Side-channel resistance test framework |
17 | 7.3.3 Required vendor information |
18 | 7.3.4 TA leakage analysis |
19 | 7.3.5 SPA/SEMA leakage analysis |
20 | 7.3.6 DPA/DEMA leakage analysis |
21 | 8 Side-channel analysis of symmetric-key cryptosystems 8.1 General 8.2 Timing attacks 8.3 SPA/SEMA 8.3.1 Attacks on key derivation process |
22 | 8.3.2 Side-channel collision attacks 8.4 DPA/DEMA |
24 | 9 ASCA on asymmetric cryptography 9.1 General |
25 | 9.2 Detailed side-channel resistance test framework |
26 | 9.3 Timing attacks 9.3.1 General 9.3.2 Standard timing analysis |
27 | 9.3.3 Micro-architectural timing analysis 9.4 SPA/SEMA 9.5 DPA/DEMA |
29 | Annex A (normative) Non-invasive attack mitigation pass/fail test metrics |
32 | Annex B (informative) Requirements for measurement apparatus |
33 | Annex C (informative) Associated security functions |
35 | Annex D (informative) Emerging attacks |
38 | Annex E (informative) Quality criteria for measurement setups |
40 | Annex F (informative) Chosen-input method to accelerate leakage analysis |
41 | Annex G (informative) Reasons that a side-channel is assessed as not measurable |
42 | Annex H (informative) Information about leakage location in relation to algorithm time |
43 | Bibliography |