We study the vulnerability of two implementations of the Data Encryption Standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryptographic systems. It exploits the engineering aspects involved in the implementation of cryptosystems and might succeed even against cryptosystems that remain impervious to sophisticated cryptanalytic techniques. A timing attack is, essentially, a way of obtaining some user's private information by carefully measuring the time it takes the user to carry out cryptographic operations. In this work, we analyze two implementations of DES. We show that a timing attack yields the Hamming weight of the key used by both DES implementations. Moreover, the attack is computationally inexpensive. We also show that all the design characteristics of the target system, necessary to carry out the timing attack, can be inferred from timing measurements. © 1999, ACM. All rights reserved.
CITATION STYLE
Hevia, A., & Kiwi, M. (1999). Strength of Two Data Encryption Standard Implementations Under Timing Attacks. ACM Transactions on Information and System Security, 2(4), 416–437. https://doi.org/10.1145/330382.330390
Mendeley helps you to discover research relevant for your work.