{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Database security, side channels

Security in Computing (3rd Edition)

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1 November 2, 2005 © Doug Tygar, 2005 (cs161.org) Statistical Database Security Doug Tygar ([email protected]) November 2, 2005 cs161.org November 2, 2005 © Doug Tygar, 2005 (cs161.org) Last lecture Covert channels Two types of leaked information Covert channels (deliberate) Side channels (accidental) November 2, 2005 © Doug Tygar, 2005 (cs161.org) Side channel examples Sound of keyboard typing Timing Power attacks November 2, 2005 © Doug Tygar, 2005 (cs161.org) Power Analysis November 2, 2005 © Doug Tygar, 2005 (cs161.org) Simple Power Analysis Top line (DES) Bottom line (one cycle of DES) November 2, 2005 © Doug Tygar, 2005 (cs161.org) Differential Power Analysis Repeat, and look for statistical averaging
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
2 November 2, 2005 © Doug Tygar, 2005 (cs161.org) Shamir secret sharing How did this work November 2, 2005 © Doug Tygar, 2005 (cs161.org) Adding with Shamir secret sharing Suppose we want to find everyone’s average
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}