Network security under siege - The timing attack

被引:6
|
作者
English, E
Hamilton, S
机构
关键词
D O I
10.1109/2.485898
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Sophisticated new methods designed to break cryptographic systems have unsettled the industry's sense of security Although most encryption algorithms are theoretically secure and remain impervious to even the most sophisticated cryptanalytic techniques, new attacks like the timing attack exploit the engineering side of network security Factors such as branching and conditional statements, RAM cache hits, and processor instructions that run in nonfixed time all contribute to predictability and therefore to the probability of key decryption. This article discusses the implications of Paul Kocher's recent timing attack against the Diffie-Hellman key exchange protocol and Goldberg and Wagner's breach of the Netscape SSL protocol for secure transactions.
引用
收藏
页码:95 / &
页数:4
相关论文
共 50 条
  • [21] Applying Attack Graphs to Network Security Metric
    Xie, Anming
    Wen, Weiping
    Zhang, Li
    Hu, Jianbin
    Chen, Zhong
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 427 - +
  • [22] Security against sybil attack in social network
    Kansara, Krishna B.
    Shekokar, Narendra M.
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [23] An estimation of attack surface to evaluate network (in)security
    Atzeni, Andrea
    Lioy, Antonio
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 493 - 497
  • [24] Attack graph based evaluation of network security
    Kotenko, Igor
    Stepashkin, Mikhail
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2006, 4237 : 216 - 227
  • [25] Fast network attack modeling and security evaluation based on attack graphs
    Kotenko, Igor
    Chechulin, Andrey
    1600, River Publishers (03): : 27 - 46
  • [26] Network Attack Chain Security Model Construction Based On Attack Framework
    Hu, Jian
    Wang, Hailin
    Li, Hanruo
    JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (04) : 116 - 127
  • [27] Network security situation assessment with network attack behavior classification
    Yang, Hongyu
    Zhang, Zixin
    Xie, Lixia
    Zhang, Liang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (10) : 6909 - 6927
  • [28] Robust security framework with bit-flipping attack and timing attack for key derivation functions
    Koh, Wen Wen
    Chuah, Chai Wen
    IET INFORMATION SECURITY, 2020, 14 (05) : 562 - 571
  • [30] Nuclear security - Los Alamos under siege after secrets recovered
    Malakoff, D
    SCIENCE, 2000, 288 (5474) : 2109 - 2110