• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems (1996)

Cached

  • Download as a PDF

Download Links

  • [www.cryptography.com]
  • [www.cryptography.com]
  • [www.cryptography.com]
  • [www.cryptography.com]
  • [www.simovits.com]
  • [www.cryptography.com]
  • [www.cryptography.com]
  • [cr.yp.to]
  • [www.cs.jhu.edu]
  • [www.cryptography.com]
  • [cdn.preterhuman.net]
  • [cdn.preterhuman.net]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Paul C. Kocher
Citations:651 - 3 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Kocher96timingattacks,
    author = {Paul C. Kocher},
    title = {Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems},
    booktitle = {},
    year = {1996},
    pages = {104--113},
    publisher = {Springer-Verlag}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext. Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosystems, and other applications where attackers can make reasonably accurate timing measurements. Techniques for preventing the attack for RSA and Diffie-Hellman are presented. Some cryptosystems will need to be revised to protect against the attack, and new protocols and algorithms may need to incorporate measures to prevent timing attacks.

Keyphrases

network-based cryptosystems    fixed diffie-hellman exponent    actual system    cryptographic token    accurate timing measurement    factor rsa key    new protocol    timing attack    vulnerable system    private key operation   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University