Strength of two data encryption standard implementations under timing attacks
- 1 November 1999
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 2 (4) , 416-437
- https://doi.org/10.1145/330382.330390
Abstract
We study the vulnerability of two implementations of the Data Encryption Standard (DES) cryptosystem under a timing attack. A timing attack is a method, recently proposed by Paul Kocher, that is designed to break cryptographic systems. It exploits the engineering aspects involved in the implementation of cryptosystems and might succeed even against cryptosys-tems that remain impervious to sophisticated cryptanalytic techniques. A timing attack is, essentially, a way of obtaining some users private information by carefully measuring the time it takes the user to carry out cryptographic operations. In this work, we analyze two implementations of DES. We show that a timing attack yields the Hamming weight of the key used by both DES implementations. Moreover, the attack is computationally inexpensive. We also show that all the design characteristics of the target system, necessary to carry out the timing attack, can be inferred from timing measurements.Keywords
This publication has 9 references indexed in Scilit:
- On the Importance of Checking Cryptographic Protocols for FaultsPublished by Springer Nature ,1997
- Network security under siege: the timing attackComputer, 1996
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsPublished by Springer Nature ,1996
- The First Experimental Cryptanalysis of the Data Encryption StandardPublished by Springer Nature ,1994
- Linear Cryptanalysis Method for DES CipherPublished by Springer Nature ,1994
- Differential cryptanalysis of DES-like cryptosystemsJournal of Cryptology, 1991
- Blind Signatures for Untraceable PaymentsPublished by Springer Nature ,1983
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976