Network security under siege - The timing attack

被引:6
|
作者
English, E
Hamilton, S
机构
关键词
D O I
10.1109/2.485898
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sophisticated new methods designed to break cryptographic systems have unsettled the industry's sense of security Although most encryption algorithms are theoretically secure and remain impervious to even the most sophisticated cryptanalytic techniques, new attacks like the timing attack exploit the engineering side of network security Factors such as branching and conditional statements, RAM cache hits, and processor instructions that run in nonfixed time all contribute to predictability and therefore to the probability of key decryption. This article discusses the implications of Paul Kocher's recent timing attack against the Diffie-Hellman key exchange protocol and Goldberg and Wagner's breach of the Netscape SSL protocol for secure transactions.
引用
收藏
页码:95 / &
页数:4
相关论文
共 50 条