期刊文献+

Further Analysis of Block Ciphers against Timing Attacks

Further Analysis of Block Ciphers against Timing Attacks
下载PDF
导出
摘要 Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers. Timing attacks break a cryptosystem by time measurement to recover keys. Most available countermeasures protect block ciphers based on the safety of modules. This paper gives a complete definition of timing attacks and studies the vulnerability of operations and modules on timing attacks. We present a method to transfer the security of the algorithm to that of secure operations by reduction. As a result, we hopefully tend to reconcile the provable security notions and modem cryptography with real-world implementations of block ciphers.
作者 LI Wei GU Dawu
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1629-1632,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China(60573031) the Foundation of National Laboratoryfor Modern Communications(51436060205J W0305) the Founda-tion of Senior Visiting Scholarship of Fudan University
关键词 timing attacks block ciphers REDUCTION timing attacks block ciphers reduction
  • 相关文献

参考文献10

  • 1Handschuh H,Heys M H.A Ti ming Attack on RC5[].Selected Areas in Cryptography.1999
  • 2Kelsey J,Schneier B,Wagner D,et al.Side Channel Crypt- analysis of Product Ciphers[].ESORICS.1998
  • 3Koeune F,Quisquater J.Ti ming Attacks against Rijndael. http:// www.dice.ucl.ac.be/ crypto/techreporst. Html . 1999
  • 4Schindler W.A Combined Ti ming and Power Attack[].Public Key Cryptography.2002
  • 5DhemJ F,Koeune F,Leroux P A,et al.APractical Imple- mentation of the Ti ming Attacks[].CARDIS.1998
  • 6Daemen J,Rij men V.Resistance against Implementation At- tacks , A Comparative Study of the AES Proposals [ EB/ OL]. http://csrc.nist.gov/ CryptoToolkit/ aes/round1/conf2/aes2conf.htm . 1999
  • 7Bellare M,Rogaway P.Optimal asymmetric encryption[].Proceeding of EUROCRYPT’.1995
  • 8P.C. Kocher.Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO ’96[].Lecture Notes in Computer Science.1996
  • 9R.L. Rivest.The RC5 encryption algorithm[].Proc st Workshop on Fast Software Encryption.1994
  • 10Data Encryption Standard . 1977

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部