Identifying backdoors: The AES case and others
Backdoors in Cryptography
Article REF: H5875 V1
Identifying backdoors: The AES case and others
Backdoors in Cryptography

Author : Eric FILIOL

Publication date: April 10, 2026 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

5. Identifying backdoors: The AES case and others

5.1 Overview of the Issue

  • The difficulty of detecting backdoors depends on their nature.

    • From an implementation and/or management standpoint, detection is only a matter of time. The numerous known cases have shown that when faced with hackers (through hardware and software reverse engineering), sooner or later the mechanism is discovered, understood, and exploited.

    • When it comes to mathematical backdoors, the situation is much more complicated, if not impossible to resolve. When the backdoor technique is disclosed in advance (as in the case of DUAL_ECC_DRBG

You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Ongoing reading
Identifying backdoors: The AES case and others

Article included in this offer

"Security of information systems"

( 89 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details
Contact us