70 research outputs found

    Templates as Master Keys

    Full text link

    Practical Biometrics On-Card Matching for Remote User Authentication Using Smart Cards

    No full text

    A Generic Protection against High-Order Differential Power Analysis

    No full text
    Abstract. Differential Power Analysis (DPA) on smart-cards was intro-duced by Paul Kocher [11] in 1998. Since, many countermeasures have been introduced to protect cryptographic algorithms from DPA attacks. Unfortunately these features are known not to be efficient against high order DPA (even of second order). In these paper we will first describe new specialized first order attack and remind how are working high or-der DPA attacks. Then we will show how these attacks can be applied to two usual actual countermeasures. Eventually we will present a method of protection (and apply it to the DES) which seems to be secure against any order DPA type attacks. The figures of a real implementation of this method will be given too

    A Robust Remote User Authentication Scheme against Smart Card Security Breach

    No full text
    Part 9: Short PapersInternational audienceRemote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show that the secrets stored in the card can be extracted by monitoring its power consumption. Therefore, Kim et al.’s scheme fail to resist smart card security breach. As the main contribution of this paper, a robust remote user authentication scheme against smart card security breach is presented, while keeping the merits of the well-known smart card based authentication schemes
    • …
    corecore