scispace - formally typeset
Search or ask a question
Topic

Timing attack

About: Timing attack is a research topic. Over the lifetime, 726 publications have been published within this topic receiving 25462 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: GPSR protocol is used to remove the Sybil attack in VANET because physical measurement of vehicle can be verified at any time and GPS coordinates will be compared and if GPS coordinate matched then there is no attack.
Abstract: VANET is a vehicular ad hoc network. This is a part of mobile ad hoc network. VANETs also called as intelligent transportation system (ITS) in which vehicles communicate to provide timely information. Their aim is to provide security, information and management of network. Instead of their many advantages vehicular network is prone to various attacks. Like prankster attack, denial of service attack, blackhole attack, alteration attack, fabrication attack, man in the middle attack, timing attack, illusion attack etc. In this we will use GPSR protocol to remove the Sybil attack. In GPSR protocol physical measurement of vehicle can be verified at any time and GPS coordinates will be compared. If GPS coordinate matched then there is no attack.

2 citations

Proceedings ArticleDOI
15 Jun 2015
TL;DR: Timing side channel vulnerability against execution time of the HMAC-SHA1 authentication algorithm is considered and linear and negative binomial regression are used to model some security features of the stored key, e.g., its length and Hamming weight.
Abstract: Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area distribution substations. There are a variety of security attacks on the PMU communications infrastructure. Timing Side Channel Attack (SCA) is one of these possible attacks. In this paper, timing side channel vulnerability against execution time of the HMAC-SHA1 authentication algorithm is considered. Both linear and negative binomial regression are used to model some security features of the stored key, e.g., its length and Hamming weight. The goal is to reveal secret-related information based on leakage models. The results would mitigate the cryptanalysis process of an attacker.

2 citations

01 Feb 2019
TL;DR: A new algorithm for automated analysis of the abundant Cache timing data based on these, which combines the vector quantization and Hidden Markov Model (HMM) cryptanalysis, which can effectively reduce the influence of noises from other processes, make the analysis ofCache timing data automatically, and the effectiveness and feasibility of Cache timing attack on RSA can be improved.
Abstract: Considering the former attack algorithm was impacted by noise easily, a trace driven data Cache timing attack model on RSA was built, and the analysis algorithm of the power exponent was provided based on the Cache hit or miss side channel information. This paper proposes a new algorithm for automated analysis of the abundant Cache timing data based on these, which combines the vector quantization and Hidden Markov Model (HMM) cryptanalysis. We built a template for Cache timing analysis, and get the operation sequence using the Viterbi algorithm with HMM, to improve the precise of analysis. Finally, under the practical environment, we realized a Cache timing attack on RSA of OpenSSL. The experiment results showed that: the proposed analysis algorithm can effectively reduce the influence of noises from other processes, make the analysis of Cache timing data automatically, and the effectiveness and feasibility of Cache timing attack on RSA also can be improved.

2 citations

Book ChapterDOI
01 Jan 2008
TL;DR: A new and effective attack strategy on neural cryptography that focuses on the authentication which the cryptosystem takes little account of is presented.
Abstract: In this paper we present a new and effective attack strategy on neural cryptography. The neural cryptosystem has been recently shown to be secure under some different attack strategies. But all these attack strategies aim at the mechanism of the secret key generated by the global dynamics of two interacting neural networks. The strategy we propose focuses on the authentication which the neural cryptosystem takes little account of. The proposed authenticated key exchange mechanisms are analyzed and convinced to be hardly applicable.

2 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Encryption
98.3K papers, 1.4M citations
85% related
Authentication
74.7K papers, 867.1K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202312
202221
202120
202030
201956
201849