Strength of Two Data Encryption Standard Implementations Under Timing Attacks

15Citations
Citations of this article
41Readers
Mendeley users who have this article in their library.

Abstract

We study the vulnerability of two implementations of the Data Encryption Standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryptographic systems. It exploits the engineering aspects involved in the implementation of cryptosystems and might succeed even against cryptosystems that remain impervious to sophisticated cryptanalytic techniques. A timing attack is, essentially, a way of obtaining some user's private information by carefully measuring the time it takes the user to carry out cryptographic operations. In this work, we analyze two implementations of DES. We show that a timing attack yields the Hamming weight of the key used by both DES implementations. Moreover, the attack is computationally inexpensive. We also show that all the design characteristics of the target system, necessary to carry out the timing attack, can be inferred from timing measurements. © 1999, ACM. All rights reserved.

Cite

CITATION STYLE

APA

Hevia, A., & Kiwi, M. (1999). Strength of Two Data Encryption Standard Implementations Under Timing Attacks. ACM Transactions on Information and System Security, 2(4), 416–437. https://doi.org/10.1145/330382.330390

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free