5. Identifying backdoors: The AES case and others
5.1 Overview of the Issue
-
The difficulty of detecting backdoors depends on their nature.
From an implementation and/or management standpoint, detection is only a matter of time. The numerous known cases have shown that when faced with hackers (through hardware and software reverse engineering), sooner or later the mechanism is discovered, understood, and exploited.
-
When it comes to mathematical backdoors, the situation is much more complicated, if not impossible to resolve. When the backdoor technique is disclosed in advance (as in the case of DUAL_ECC_DRBG
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Identifying backdoors: The AES case and others
Article included in this offer
"Security of information systems"
(
89 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - FILIOL (E.) - Texte de l'audition devant la commission parlementaire « sécurité numérique et risques : enjeux et chances pour les entreprises ». - Dans Rapport 2541 (Assemblée Nationale)/271 (Sénat) – Tome II. Office Parlementaire d'Évaluation des Choix Scientifiques et Technologiques (OPECST), pp. 181–188 Paris (2015).
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!