- based on DataPower crypto extension function primitives DES is available in CBC mode only (cipher block chaining)
- but that does not mean that you cannot do DES encryption in ECB mode:
just implement the cryptographic primitive (64bit block en-/de-crypt) in XSLT(!)
A 64bit des:encrypt-blk() call takes roughly 3ms, which means that you do not want to apply that on big data.
- two oscilloscope cards for the server (100MHz, 2GHz)
- a special card reader with high precision probe
- many smartcards, some secure, others less secure, for adjustment
- software for doing side channel attacks.
What was easy to do was to break triple DES on cards without randomization counter-measure based on statistical analysis of several thousand measurements.
The code for doing exponentiation in that cards was "efficient", it did compute
- x^(2*n) by (x^n)^2 and
- x^(2*n+1) by ((x^n)^2)*x
Once we got a complaint from a cert agency that a specific pattern on the oscilloscope would leak information.
Using the oscilloscope I was able to disprove that statement.
Now how to generate a "spike"?
That was easy -- just power on the (hardware) random generator and immediately power it off with the next command.