Or, a stupidly designed cryptographic cipher combined with an error-correcting code where again carefully corrupted packets, and requests for retransmissions, reveal information about the secret payload.
Monday, October 27, 2008
Turbo code interleaver attack
I wonder if the deterministic nature of most turbo code interleavers may form the basis of an attack, for example, a Denial-of-service attack where carefully corrupted packets induce worst-case computational load (maximum number of iterations to achieve convergence) thereby causing your 3G cell phone to quickly run out of battery.
Subscribe to:
Post Comments
(
Atom
)
No comments :
Post a Comment