A timing attack against the secret permutation in the McEliece PKC

40Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this work we present a novel timing attack against the McEliece public key cryptosystem (PKC). In contrast to former works investigating timing attacks that aim at recovering the message, we devise how to exploit a vulnerability in the Patterson algorithm that allows the attacker to gather information about the secret permutation through a timing side channel. This information can be used to dramatically reduce the cost of a brute force attack against the secret key. We also describe the results obtained from a proof of concept implementation of the attack and give an appropriate countermeasure. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Strenzke, F. (2010). A timing attack against the secret permutation in the McEliece PKC. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6061 LNCS, pp. 95–107). https://doi.org/10.1007/978-3-642-12929-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free