A practical timing attack on RSA over a LAN

被引:0
|
作者
Lodato, Mark J. [1 ]
Jouny, Ismail [1 ]
机构
[1] Lafayette Coll, Dept Elect & Comp Engn, Easton, PA 18042 USA
关键词
side-channel cryptanalysis; RSA; public-key cryptography; timing attack;
D O I
10.1117/12.673492
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Today, the specific implementation of a cryptosystem is of possibly greater importance than the underlying cryptographic algorithm itself. Through side-channel cryptanalysis, an adversary may deduce a secret key just by monitorm g implementation-specific side channels, such as execution time or power consumption during a cryptographic operation. In this paper, we describe a successful remote timing attack against a server running a protocol similar to SSL. Using a fully-automated attack on Chinese Remaindering Theorem (CRT) implementations of RSA, we show it is practical to recover a 1024-bit key in under an hour over a local area network.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Analysis on the Parameter Selection Method for FLUSH plus RELOAD Based Cache Timing Attack on RSA
    Zhou Ping
    Wang Tao
    Li Guang
    Zhang Fan
    Zhao Xinjie
    CHINA COMMUNICATIONS, 2015, 12 (06) : 33 - 45
  • [22] Analysis on the Parameter Selection Method for FLUSH+RELOAD Based Cache Timing Attack on RSA
    ZHOU Ping
    WANG Tao
    LI Guang
    ZHANG Fan
    ZHAO Xinjie
    中国通信, 2015, 12 (06) : 33 - 45
  • [23] A generalized Wiener attack on RSA
    Blömer, J
    May, A
    PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 1 - 13
  • [24] The Attack of the RSA Subgroup Assumption
    Weng, Jiang
    Dou, Yun-Qi
    Ma, Chuan-Gui
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (03) : 597 - 610
  • [25] PRACTICAL RSA TRAPDOOR
    ANDERSON, RJ
    ELECTRONICS LETTERS, 1993, 29 (11) : 995 - 995
  • [26] Standardization Workflow Technology of Software Testing Processes and its Application to SRGM on RSA Timing Attack Tasks
    Li, Nan
    Han, Qiang
    Zhang, Yangyang
    Li, Cong
    He, Yu
    Liu, Haide
    Mao, Zijian
    IEEE Access, 2022, 10 : 82540 - 82559
  • [27] Standardization Workflow Technology of Software Testing Processes and its Application to SRGM on RSA Timing Attack Tasks
    Li, Nan
    Han, Qiang
    Zhang, Yangyang
    Li, Cong
    He, Yu
    Liu, Haide
    Mao, Zijian
    IEEE ACCESS, 2022, 10 : 82540 - 82559
  • [28] A variant of Wiener’s attack on RSA
    Andrej Dujella
    Computing, 2009, 85 : 77 - 83
  • [29] An Efficient Method for Attack RSA Scheme
    Aboud, Sattar J.
    2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 587 - 591
  • [30] A new related message attack on RSA
    Yacobi, Oded
    Yacobi, Yacov
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2006, 3895 LNCS : 187 - 195