On the Randomness Timing Analysis of Timing Side Channel Attack on Key Derivation Functions

被引:1
|
作者
Koh, Wen Wen [1 ]
Chuah, Chai Wen [1 ]
机构
[1] Univ Tun Hussein Onn Malaysia, ISIG, Batu Pahat 86400, Johor, Malaysia
关键词
Timing attack; randomness timing; key derivation function;
D O I
10.1145/3301326.3301332
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A timing attack is an example of a side channel attack which relies on the leaking timing information from the implementation of a crypto system. The different type of cryptographic primitives used to construct the key derivation functions has resulted in timing variation which enables the adversary to perform timing attack on key derivation functions. Based on the paper published by Chuah and Koh, the software implementation of key derivation functions using hash functions, stream ciphers and block cipher as the cryptographic primitives are vulnerable to the timing attack. This kind of attack can be mitigated via masks the actual timing information using randomness timing solution. The randomness timing solution is based on the concept of "random for loop". This paper shows the outcome of experiments on implementing the randomness timing delay on key derivation functions based on three type of cryptographic primitives. The experiment's result indicated that the countermeasure propose is secure against timing side channel attack on key derivation functions proposals.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 50 条
  • [41] Timing Side-Channel Mitigation via Automated Program Repair
    Ruan, Haifeng
    Noller, Yannic
    Tizpaz-Niari, Saeid
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    ACM Transactions on Software Engineering and Methodology, 2024, 33 (08)
  • [42] Practical Timing Side Channel Attacks Against Kernel Space ASLR
    Hund, Ralf
    Willems, Carsten
    Holz, Thorsten
    2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, : 191 - 205
  • [43] GPU Acceleration of RSA is Vulnerable to Side-channel Timing Attacks
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [44] Exploring Timing Side-channel Attacks on Path-ORAMs
    Bao, Chongxi
    Srivastava, Ankur
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 68 - 73
  • [45] Analysis of Secret Key Randomness Exploiting the Radio Channel Variability
    Mazloum, Taghrid
    Sibille, Alain
    INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2015, 2015
  • [46] PolyRhythm: Adaptive Tuning of a Multi-Channel Attack Template for Timing Interference
    Li, Ao
    Sudvarg, Marion
    Liu, Han
    Yu, Zhiyuan
    Gill, Chris
    Zhang, Ning
    2022 IEEE 43RD REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2022), 2022, : 225 - 239
  • [47] Side-channel attack against RSA key generation algorithms
    Bauer, Aurélie
    Jaulmes, Eliane
    Lomné, Victor
    Prouff, Emmanuel
    Roche, Thomas
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 223 - 241
  • [48] Side-Channel Attack against RSA Key Generation Algorithms
    Bauer, Aurelie
    Jaulmes, Eliane
    Lomne, Victor
    Prouff, Emmanuel
    Roche, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 223 - 241
  • [49] Bucketing and information flow analysis for provable timing attack mitigation
    Terauchi, Tachio
    Antonopoulos, Timos
    JOURNAL OF COMPUTER SECURITY, 2020, 28 (06) : 607 - 634
  • [50] Key-dependent side-channel cube attack on CRAFT
    Pang, Kok-An
    Abdul-Latip, Shekh Faisal
    ETRI JOURNAL, 2021, 43 (02) : 344 - 356