Results 1 - 10
of
12,397
Remote Timing Attacks are Practical
"... Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running ..."
Abstract
-
Cited by 248 (4 self)
- Add to MetaCart
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
, 1996
"... By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known cip ..."
Abstract
-
Cited by 651 (3 self)
- Add to MetaCart
By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known
Cache-timing attacks on AES
, 2005
"... Abstract. This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs. ..."
Abstract
-
Cited by 136 (3 self)
- Add to MetaCart
Abstract. This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs.
Timing Attacks on Web Privacy
, 2000
"... We describe a class of attacks that can compromise the privacy of users' Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has recently visited some other, unrelated Web page. The malicious page can determine this information by measuring the ti ..."
Abstract
-
Cited by 117 (0 self)
- Add to MetaCart
We describe a class of attacks that can compromise the privacy of users' Web-browsing histories. The attacks allow a malicious Web site to determine whether or not the user has recently visited some other, unrelated Web page. The malicious page can determine this information by measuring
A report on Timing Attacks
, 2007
"... A side channel attack tries to exploit specific properties of the implementation and operating environment of a cryptosystem rather than its mathematical specification [HMV04]. Timing attack is a class of side channel attack where the attacker tries to break an encryption algorithm by using informat ..."
Abstract
- Add to MetaCart
A side channel attack tries to exploit specific properties of the implementation and operating environment of a cryptosystem rather than its mathematical specification [HMV04]. Timing attack is a class of side channel attack where the attacker tries to break an encryption algorithm by using
Cache-timing attacks on AES
"... This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs. ..."
Abstract
- Add to MetaCart
This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs.
Cache-timing attacks on AES
"... This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs. ..."
Abstract
- Add to MetaCart
This paper warns against the use of S-boxes in cryptography. In particular, this paper shows that a simple cache-timing attack against AES software reveals some key bits; this paper also discusses some of the obstacles to constant-time array access on modern CPUs.
A Practical Implementation of the Timing Attack
, 1998
"... When the running time of a cryptographic algorithm is nonconstant, timing measurements can leak information about the secret key. This idea, first publicly introduced by Kocher, is developed here to attack an earlier version of the CASCADE smart card. We propose several improvements on Kocher's ..."
Abstract
-
Cited by 73 (3 self)
- Add to MetaCart
When the running time of a cryptographic algorithm is nonconstant, timing measurements can leak information about the secret key. This idea, first publicly introduced by Kocher, is developed here to attack an earlier version of the CASCADE smart card. We propose several improvements on Kocher
Improving timing attack on RSA-CRT . . .
, 2013
"... ... into practice. To improve the feasibility of timing attack, the current study proposes an theoretical timing attack algorithms or have extended the existing ones. In 1998, Dhem et al. [8] employed timing attack into a Smartcard that stores an RSA private key. Schindler [19] proposed a timing att ..."
Abstract
- Add to MetaCart
... into practice. To improve the feasibility of timing attack, the current study proposes an theoretical timing attack algorithms or have extended the existing ones. In 1998, Dhem et al. [8] employed timing attack into a Smartcard that stores an RSA private key. Schindler [19] proposed a timing
A timing attack against Rijndael
, 1999
"... This paper describes a timing attack against the AES candidate Rijndael. We show how a careless implementation can be broken with some thousands measures per key byte, provided a very limited knowledge of the implementation. 2 Brief description of Rijndael ..."
Abstract
-
Cited by 20 (1 self)
- Add to MetaCart
This paper describes a timing attack against the AES candidate Rijndael. We show how a careless implementation can be broken with some thousands measures per key byte, provided a very limited knowledge of the implementation. 2 Brief description of Rijndael
Results 1 - 10
of
12,397