Database security, side channels

Security in Computing (3rd Edition)

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1 November 2, 2005 © Doug Tygar, 2005 (cs161.org) Statistical Database Security Doug Tygar (doug.tygar@gmail.com) November 2, 2005 cs161.org November 2, 2005 © Doug Tygar, 2005 (cs161.org) Last lecture Covert channels Two types of leaked information ± Covert channels (deliberate) ± Side channels (accidental) November 2, 2005 © Doug Tygar, 2005 (cs161.org) Side channel examples Sound of keyboard typing Timing Power attacks November 2, 2005 © Doug Tygar, 2005 (cs161.org) Power Analysis November 2, 2005 © Doug Tygar, 2005 (cs161.org) Simple Power Analysis Top line (DES) Bottom line (one cycle of DES) November 2, 2005 © Doug Tygar, 2005 (cs161.org) Differential Power Analysis Repeat, and look for statistical averaging
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2 November 2, 2005 © Doug Tygar, 2005 (cs161.org) Shamir secret sharing How did this work November 2, 2005 © Doug Tygar, 2005 (cs161.org) Adding with Shamir secret sharing Suppose we want to find everyone’s average salary
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/29/2008 for the course CS 194 taught by Professor Joseph during the Fall '05 term at University of California, Berkeley.

Page1 / 2

Database security, side channels - Statistical Database...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online