Abstract
Attacks are presented on the IBM 4758 CCA and the Visa Security Module. Two new attack principles are demonstrated. Related key attacks use known or chosen differences between two cryptographic keys. Data protected with one key can then be abused by manipulation using the other key. Meet in the middle attacks work by generating a large number of unknown keys of the same type, thus reducing the key space that must be searched to discover the value of one of the keys in the type. Design heuristics are presented to avoid these attacks and other common errors.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
IBM 4758 PCI Cryptographic Coprocessor, CCA Basic Services Reference And Guide, Release 1.31 for the IBM 4758-001
S.M. Matyas, ‘Key Handling with Control Vectors’, IBM Systems Journal v. 30 n. 2, 1991, p. 151–174
S.M. Matyas, A.V. Le, D.G. Abraham, ‘A Key Management Scheme Based on Control Vectors’, IBM Systems Journal v. 30 n. 2, 1991, pp. 175–191
IBM Comment on ‘A Chosen Key Difference Attack on Control Vectors’, Jan 2000
NSM Developers Manual, Computer Security Associates (Pty.) Ltd., July 1990
‘Security Requirements for Cryptographic Modules’ Federal Information Processing Standards 140-1
‘The Correctness of Crypto Transaction Sets’ R. Anderson, April 2000
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bond, M. (2001). Attacks on Cryptoprocessor Transaction Sets. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_19
Download citation
DOI: https://doi.org/10.1007/3-540-44709-1_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42521-2
Online ISBN: 978-3-540-44709-2
eBook Packages: Springer Book Archive