A practical implementation of the timing attack

101Citations
Citations of this article
72Readers
Mendeley users who have this article in their library.
Get full text

Abstract

When the running time of a cryptographic algorithm is non-constant, timing measurements can leak information about the secret key. This idea, first publicly introduced by Kocher, is developed here to attack an earlier version of the CASCADE smart card1. We propose several improvements on Kocher’s ideas, leading to a practical implementation that is able to break a 512-bit key in few hours, provided we are able to collect 300 000 timing measurements (128-bit keys can be re- covered in few seconds using a personal computer and less than 10 000 samples). We therefore show that the timing attack represents an important threat against cryptosystems, which must be very seriously taken into account.

Cite

CITATION STYLE

APA

Dhem, J. F., Koeune, F., Leroux, P. A., Mestré, P., Quisquater, J. J., & Willems, J. L. (2000). A practical implementation of the timing attack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1820, pp. 167–182). Springer Verlag. https://doi.org/10.1007/10721064_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free