A practical timing attack on RSA over a LAN

被引:0
|
作者
Lodato, Mark J. [1 ]
Jouny, Ismail [1 ]
机构
[1] Lafayette Coll, Dept Elect & Comp Engn, Easton, PA 18042 USA
关键词
side-channel cryptanalysis; RSA; public-key cryptography; timing attack;
D O I
10.1117/12.673492
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the specific implementation of a cryptosystem is of possibly greater importance than the underlying cryptographic algorithm itself. Through side-channel cryptanalysis, an adversary may deduce a secret key just by monitorm g implementation-specific side channels, such as execution time or power consumption during a cryptographic operation. In this paper, we describe a successful remote timing attack against a server running a protocol similar to SSL. Using a fully-automated attack on Chinese Remaindering Theorem (CRT) implementations of RSA, we show it is practical to recover a 1024-bit key in under an hour over a local area network.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Designing a practical ATM LAN
    Biagioni, Edoardo
    Cooper, Eric
    Sansom, Robert
    IEEE Network, 1993, 7 (02): : 32 - 39
  • [42] Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ
    Chua, SK
    Leung, KH
    Ling, S
    THEORETICAL COMPUTER SCIENCE, 1999, 226 (1-2) : 19 - 27
  • [43] SECURITY OF RSA-TYPE CRYPTOSYSTEMS OVER ELLIPTIC-CURVES AGAINST HASTAD ATTACK
    KUWAKADO, H
    KOYAMA, K
    ELECTRONICS LETTERS, 1994, 30 (22) : 1843 - 1844
  • [44] TIMING ANALYSIS OF BUILT IN LAN CONTROLLER
    BAUMS, A
    CHIPA, A
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1994, (01): : 75 - 77
  • [45] ConNOC: A practical timing channel attack on network-on-chip hardware in a multicore processor
    Ali, Usman
    Khan, Omer
    2021 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2021, : 192 - 202
  • [46] Power attack on small RSA public exponent
    Fouque, Pierre-Alain
    Kunz-Jacques, Sebastien
    Martinet, Gwenaelle
    Muller, Frederic
    Valette, Frederic
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 339 - 353
  • [47] On the improvement of the BDF attack on LSBS-RSA
    Sun, Hung-Min
    Wu, Mu-En
    Wang, Huaxiong
    Guo, Jian
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 84 - +
  • [48] Practical group signatures from RSA
    Cui, Shi
    Cheng, Xiangguo
    Chan, Choong Wah
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, 2006, : 121 - +
  • [49] On an attack on RSA with small CRT-exponents
    HAN LiDong 1
    2 School of Mathematics
    3 Institute for Advanced Study
    4 Department of Electrical Engineering and Computer Science
    Science China(Information Sciences), 2010, 53 (08) : 1511 - 1518
  • [50] An Application of Low Private Exponent Attack on RSA
    Zheng, Yong-Hui
    Zhu, Yue-Fei
    Xu, Hong
    ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1864 - 1866