نتایج جستجو برای: timing attacks

تعداد نتایج: 142928  

1998
John Kelsey Bruce Schneier David A. Wagner Chris Hall

Building on the work of Kocher [Koc96], we introduce the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the vulnerabilities they introduce, demonstrate side-channel attacks against three product ciphers—timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES—and then ge...

Journal: :CoRR 2013
Kevin Benton Ty Bross

M an in the middle attacks are a significant threat to modern e-commerce and online communications, even when such transactions are protected by TLS. We intend to show that it is possible to detect man-in-the-middle attacks on SSL and TLS by detecting timing differences between a standard SSL session and an attack we created.

1995
Paul C. Kocher

Cryptosystems often take slightly di erent amounts of time to process di erent messages. With network-based cryptosystems, cryptographic tokens, and many other applications, attackers can measure the amount of time used to complete cryptographic operations. This abstract shows that timing channels can, and often do, leak key material. The attacks are particularly alarming because they often req...

Journal: :IACR Cryptology ePrint Archive 2015
David Wong

In 2011, B.B.Brumley and N.Tuveri found a remote timing attack on OpenSSL’s ECDSA implementation for binary curves. We will study if the title of their paper was indeed relevant (Remote Timing Attacks are Still Practical). We improved on their lattice attack using the Embedding Strategy that reduces the Closest Vector Problem to the Shortest Vector Problem so as to avoid using Babai’s procedure...

2010
Andrey Bogdanov Thomas Eisenbarth Christof Paar Malte Wienecke

This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryptographic properties of AES, namely, on the MDS property of the linear code providing the diffusion matrix used in the MixColumns transform. It is a chosen-plaintext attack where pairs of AES executions are treated di...

2017
Craig Disselkoen David Kohlbrenner Leo Porter Dean M. Tullsen

Last-Level Cache (LLC) attacks typically exploit timing side channels in hardware, and thus rely heavily on timers for their operation. Many proposed defenses against such side-channel attacks capitalize on this reliance. This paper presents PRIME+ABORT, a new cache attack which bypasses these defenses by not depending on timers for its function. Instead of a timing side channel, PRIME+ABORT le...

2008
Michael Backes Boris Köpf

We propose a novel approach for quantifying a system’s resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret information that an attacker can extract from a system from a given number of side-channel measurements. We provide an algorithm to compute this measure, and we use it to analyze the resistance of hardware implementations of cryptographic al...

2003
Z. C. Yu Stephen B. Furber Luis A. Plana

Self-timed logic may have advantages for security-sensitive applications. The absence of a clock, as a reliable timing reference, makes conventional power analysis attacks more difficult. However, the variability of the timing of self-timed circuits is a weakness that could be exploited by alternative attack techniques. This paper introduces a methodology for the differential power analysis of ...

2009
Rosemary H Collier Stan Finch

The timing of pest insect attacks can vary greatly from region to region and from year to year. A simulation method, based on rates of insect development, has been developed for forecasting the timing of insect attacks on cruciferous crops. The method is based on using a fixed number of individuals from one generation to the next and simulates the timing of events in the life cycle of the pests...

Journal: :International Journal of Electronic Security and Digital Forensics 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید