Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Thomas S. Messerges is active.

Publication


Featured researches published by Thomas S. Messerges.


IEEE Transactions on Computers | 2002

Examining smart-card security under the threat of power analysis attacks

Thomas S. Messerges; Ezzat A. Dabbish; Robert H. Sloan

This paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and develop an approach to model the signal-to-noise ratio (SNR). We show how this SNR can be significantly improved using a multiple-bit attack. Experimental results against a smart-card implementation of the Data Encryption Standard demonstrate the effectiveness of our multiple-bit attack. Potential countermeasures to these attacks are also discussed.


cryptographic hardware and embedded systems | 2000

Using Second-Order Power Analysis to Attack DPA Resistant Software

Thomas S. Messerges

Under a simple power leakage model based on Hamming weight, a software implementation of a data-whitening routine is shown to be vulnerable to a first-order Differential Power Analysis (DPA) attack. This routine is modified to resist the first-order DPA attack, but is subsequently shown to be vulnerable to a second-order DPA attack. A second-order DPA attack that is optimal under certain assumptions is also proposed. Experimental results in an ST16 smartcard confirm the practicality of the first and second-order DPA attacks.


fast software encryption | 2000

Securing the AES Finalists Against Power Analysis Attacks

Thomas S. Messerges

Techniques to protect software implementations of the AES candidate algorithms from power analysis attacks are investigated. New countermeasures that employ random masks are developed and the performance characteristics of these countermeasures are analyzed. Implementations in a 32-bit, ARM-based smartcard are considered.


cryptographic hardware and embedded systems | 1999

Power Analysis Attacks of Modular Exponentiation in Smartcards

Thomas S. Messerges; Ezzy A. Dabbish; Robert H. Sloan

Three new types of power analysis attacks against smartcard implementations of modular exponentiation algorithms are described. The first attack requires an adversary to exponentiate many random messages with a known and a secret exponent. The second attack assumes that the adversary can make the smartcard exponentiate using exponents of his own choosing. The last attack assumes the adversary knows the modulus and the exponentiation algorithm being used in the hardware. Experiments show that these attacks are successful. Potential countermeasures are suggested.


security of ad hoc and sensor networks | 2003

A security design for a general purpose, self-organizing, multihop ad hoc wireless network

Thomas S. Messerges; Johnas Cukier; Tom A. M. Kevenaar; Larry C. Puhl; René Struik; Ed Callaway

We present a security design for a general purpose, self-organizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. The design employs elliptic-curve cryptography and the AES block cipher to supply message integrity and encryption services, key-establishment protocols, and a large set of extended security services, while at the same time meeting the low implementation cost, low power, and high flexibility requirements of ad hoc wireless networks.


IEEE Computer | 2007

Resolving the Micropayment Problem

Mahesh V. Tripunitara; Thomas S. Messerges

Cryptography-based alternatives are the most appropriate long-term solution to the micropayment problem, especially compared to the business solution of restructuring transaction fees. We acknowledge that the business solution is easier to deploy in the short term. Cryptography-based solutions face tremendous deployment challenges: they need more market testing, they significantly change payment-ecosystem processes, their legal implications are unclear, and they require new kinds of devices and processes for merchants. Nonetheless, the long-term payoff of investing in such sound solutions are be tremendous


Archive | 2002

System and method for secure and convenient management of digital electronic content

Thomas S. Messerges; Ezzat A. Dabbish; Larry C. Puhl; Dean H. Vogler


WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology | 1999

Investigations of power analysis attacks on smartcards

Thomas S. Messerges; Ezzy A. Dabbish; Robert H. Sloan


Archive | 2006

User-configurable priority list for mobile device electronic payment applications

Thomas S. Messerges; Ruben R. Formoso


Archive | 2002

Methods and apparatus for managing secured software for a wireless device

Ezzat A. Dabbish; Thomas S. Messerges

Collaboration


Dive into the Thomas S. Messerges's collaboration.

Researchain Logo
Decentralizing Knowledge