Breaking RSA Authentication on Zynq-7000 SoC and Beyond: Identification of Critical Security Flaw in FSBL Software.
Prasanna RaviArpan JatiShivam BhasinPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- elliptic curve cryptography
- public key cryptography
- private key
- public key
- security requirements
- security analysis
- security mechanisms
- authentication scheme
- user authentication
- elliptic curve
- identity authentication
- authentication protocol
- virtual private network
- digital signature
- authentication mechanism
- cryptographic algorithms
- key distribution
- public key infrastructure
- security services
- software development
- fuzzy vault
- security model
- embedded systems
- factor authentication
- key exchange
- software systems
- computer systems
- authentication systems
- data encryption
- high security
- integrity verification
- access control
- operating system
- software architecture
- biometric data
- smart card
- information security
- security issues
- diffie hellman
- key agreement
- computer security
- signature scheme
- hardware and software
- digital signature scheme
- encryption decryption
- security systems
- biometric authentication
- mutual authentication
- identity management
- provably secure
- secure communication