Replay attack
Form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed
To help you find your way through major technical terms used in the cybersecurity field
Form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed
Open and free 64-bit RISC instruction set architecture (ISA), i.e. with open specifications that can be freely used by education, research and industry. It also refers to a processor using this instruction set.
Highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. Roots of trust provide a firm foundation from which to build security and trust.
Public-key cryptosystem that is widely used for secure data transmission. In RSA, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.
Cryptographic hash functions used to check the integrity of a data published by the National Institute of Standards and Technology (NIST). There are several versions (SHA-2, SHA-256 or SHA-512) that define hash algorithms used by administrative authorities for signing certificates.
Secure-IC's security laboratory and internal innovation engine
Attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs). Timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information, which can be exploited. Some side-channel attacks require technical knowledge of the internal operation of the system, although others such as differential power analysis are effective as black-box attacks.
New field of application for Side-Channel Attacks (SCA), that was recently introduced, following initial results on the GSM A3/A8 algorithm. The principle of SCARE is to use side-channel information (for instance, power consumption) as a tool to reverse-engineer some secret parts of a cryptographic implementation. SCARE has the advantage of being discrete and non-intrusive