Topic
Timing attack
About: Timing attack is a research topic. Over the lifetime, 726 publications have been published within this topic receiving 25462 citations.
Papers published on a yearly basis
Papers
More filters
•
01 Jan 1996
2 citations
••
TL;DR: GPSR protocol is used to remove the Sybil attack in VANET because physical measurement of vehicle can be verified at any time and GPS coordinates will be compared and if GPS coordinate matched then there is no attack.
Abstract: VANET is a vehicular ad hoc network. This is a part of mobile ad hoc network. VANETs also called as intelligent transportation system (ITS) in which vehicles communicate to provide timely information. Their aim is to provide security, information and management of network. Instead of their many advantages vehicular network is prone to various attacks. Like prankster attack, denial of service attack, blackhole attack, alteration attack, fabrication attack, man in the middle attack, timing attack, illusion attack etc. In this we will use GPSR protocol to remove the Sybil attack. In GPSR protocol physical measurement of vehicle can be verified at any time and GPS coordinates will be compared. If GPS coordinate matched then there is no attack.
2 citations
••
15 Jun 2015
TL;DR: Timing side channel vulnerability against execution time of the HMAC-SHA1 authentication algorithm is considered and linear and negative binomial regression are used to model some security features of the stored key, e.g., its length and Hamming weight.
Abstract: Phasor Measurement Units (PMUs), or synchrophasors, are rapidly being deployed in the smart grid with the goal of measuring phasor quantities concurrently from wide area distribution substations. There are a variety of security attacks on the PMU communications infrastructure. Timing Side Channel Attack (SCA) is one of these possible attacks. In this paper, timing side channel vulnerability against execution time of the HMAC-SHA1 authentication algorithm is considered. Both linear and negative binomial regression are used to model some security features of the stored key, e.g., its length and Hamming weight. The goal is to reveal secret-related information based on leakage models. The results would mitigate the cryptanalysis process of an attacker.
2 citations
01 Feb 2019
TL;DR: A new algorithm for automated analysis of the abundant Cache timing data based on these, which combines the vector quantization and Hidden Markov Model (HMM) cryptanalysis, which can effectively reduce the influence of noises from other processes, make the analysis ofCache timing data automatically, and the effectiveness and feasibility of Cache timing attack on RSA can be improved.
Abstract: Considering the former attack algorithm was impacted by noise easily, a trace driven data Cache timing attack model on RSA was built, and the analysis algorithm of the power exponent was provided based on the Cache hit or miss side channel information. This paper proposes a new algorithm for automated analysis of the abundant Cache timing data based on these, which combines the vector quantization and Hidden Markov Model (HMM) cryptanalysis. We built a template for Cache timing analysis, and get the operation sequence using the Viterbi algorithm with HMM, to improve the precise of analysis. Finally, under the practical environment, we realized a Cache timing attack on RSA of OpenSSL. The experiment results showed that: the proposed analysis algorithm can effectively reduce the influence of noises from other processes, make the analysis of Cache timing data automatically, and the effectiveness and feasibility of Cache timing attack on RSA also can be improved.
2 citations
••
01 Jan 2008TL;DR: A new and effective attack strategy on neural cryptography that focuses on the authentication which the cryptosystem takes little account of is presented.
Abstract: In this paper we present a new and effective attack strategy on neural cryptography. The neural cryptosystem has been recently shown to be secure under some different attack strategies. But all these attack strategies aim at the mechanism of the secret key generated by the global dynamics of two interacting neural networks. The strategy we propose focuses on the authentication which the neural cryptosystem takes little account of. The proposed authenticated key exchange mechanisms are analyzed and convinced to be hardly applicable.
2 citations