scispace - formally typeset
Search or ask a question
Topic

Timing attack

About: Timing attack is a research topic. Over the lifetime, 726 publications have been published within this topic receiving 25462 citations.


Papers
More filters
Book ChapterDOI
26 Oct 2016
TL;DR: This paper resurrects the corresponding ‘right-to-left’ version of the Montgomery powering ladder and demonstrates a new attack on both versions in the context of elliptic curves.
Abstract: In the 1980s, Peter Montgomery developed a powerful, fast algorithm for calculating multiples of field elements. Over subsequent years, the algorithm was adapted to work in arbitrary abelian groups. By the year 2000, it had been developed further to resist standard power and timing attacks and became known as the ‘Montgomery ladder’. In the literature, the focus of this algorithm has been to compute from most to least significant bit, known as the ‘left-to-right’ version. In this paper, we first resurrect the corresponding ‘right-to-left’ version of the Montgomery powering ladder and then demonstrate a new attack on both versions in the context of elliptic curves.

1 citations

Proceedings ArticleDOI
17 Apr 2005
TL;DR: An efficient immunity method is proposed for two-prime RSA cryptosystem against hardware fault attack that is 15% faster than the previous design while requiring only 70% of the hardware resource.
Abstract: In this paper, an efficient immunity method is proposed for two-prime RSA cryptosystem against hardware fault attack. The proposed system has more immunity than the previous system and is targeted for FPGA implementation. For the 32-bit signing case, the proposed method is 15% faster than the previous design while requiring only 70% of the hardware resource.

1 citations

Proceedings ArticleDOI
08 Oct 2015
TL;DR: This new attack suggests that countermeasures must be provided to guarantee the security of DTLS and leverages the cache side-channel attack to obtain necessary information and then a padding oracle attack is performed to recovery plaintext.
Abstract: The DTLS (Datagram Transport Layer Security) protocol allows a huge number of delay-sensitive applications to communicate in a secure channel, and its security research is growing with significant importance. We propose an attack framework to recovery plaintext in DTLS. Our attack leverages the cache side-channel attack to obtain necessary information, and then a padding oracle attack is performed to recovery plaintext. Experimental results on an AES implementation verify the validity and the efficiency of our attack method. This new attack suggests that countermeasures must be provided to guarantee the security of DTLS.

1 citations

Proceedings Article
11 Dec 2014
TL;DR: The purpose of this study is to refine the discussion of Köpf, and give more precise understanding of the contribution of the bucketing technique.
Abstract: Timing attack are regarded as serious threats to many practical security mechanisms. However, it is difficult to estimate the risk of attack because we cannot predict the ability and the behavior of attackers. To tackle this issue, Köpf et al. focus on the mutual information between a secret key and timing observations that an attacker acquires. Any attacker cannot learn more information than the mutual information, and the discussion of this approach gives a certain upperbound on the risk of timing attacks. Köpf et al. adopted this approach to evaluate the contribution of a bucketing technique that was proposed by themselves. However, the mathematical discussion therein needs more improvement. The purpose of this study is to refine the discussion of Köpf, and give more precise understanding of the contribution of the bucketing technique.

1 citations

Journal Article
TL;DR: The Chinese Remainder Theorem(CRT)based RSA algorithm is very suitable in smartcard and cryptosystem, however the security benefit people's interest is yet to be determined.
Abstract: The Chinese Remainder Theorem(CRT)based RSA algorithm is very suitable in smartcard and cryptosystem,however the security benefit people's interestThis paper showed a method to practice an optical injection in cryptographic deviceThe attack was used laser irradiation the depackaged device to impact cryptographic computation process,obtained the secret information from the inside of chipThis paper presented implementation CRT-RSA algorithm in cryptographic device existed security issue

1 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
89% related
Public-key cryptography
27.2K papers, 547.7K citations
88% related
Encryption
98.3K papers, 1.4M citations
85% related
Authentication
74.7K papers, 867.1K citations
85% related
Key (cryptography)
60.1K papers, 659.3K citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202312
202221
202120
202030
201956
201849