timing attacks
Recently Published Documents


TOTAL DOCUMENTS

118
(FIVE YEARS 33)

H-INDEX

16
(FIVE YEARS 3)

2021 ◽  
pp. 102454
Author(s):  
Arsalan Javeed ◽  
Cemal Yilmaz ◽  
Erkay Savas
Keyword(s):  

2021 ◽  
Author(s):  
Cong Li ◽  
Qiang Han ◽  
Bingbing Lei ◽  
Haide Liu ◽  
Cong Liu ◽  
...  

2021 ◽  
Vol 34 (3) ◽  
Author(s):  
Chester Rebeiro ◽  
Debdeep Mukhopadhyay

Author(s):  
Isaac Griswold-Steiner ◽  
N'godjigui Diarrassouba ◽  
Shreyesh Arangath ◽  
Abdul Serwadda

2021 ◽  
Author(s):  
Mingtian Tan ◽  
Junpeng Wan ◽  
Zhe Zhou ◽  
Zhou Li
Keyword(s):  

Author(s):  
Johannes Mittmann ◽  
Werner Schindler

AbstractMontgomery’s and Barrett’s modular multiplication algorithms are widely used in modular exponentiation algorithms, e.g. to compute RSA or ECC operations. While Montgomery’s multiplication algorithm has been studied extensively in the literature and many side-channel attacks have been detected, to our best knowledge no thorough analysis exists for Barrett’s multiplication algorithm. This article closes this gap. For both Montgomery’s and Barrett’s multiplication algorithm, differences of the execution times are caused by conditional integer subtractions, so-called extra reductions. Barrett’s multiplication algorithm allows even two extra reductions, and this feature increases the mathematical difficulties significantly. We formulate and analyse a two-dimensional Markov process, from which we deduce relevant stochastic properties of Barrett’s multiplication algorithm within modular exponentiation algorithms. This allows to transfer the timing attacks and local timing attacks (where a second side-channel attack exhibits the execution times of the particular modular squarings and multiplications) on Montgomery’s multiplication algorithm to attacks on Barrett’s algorithm. However, there are also differences. Barrett’s multiplication algorithm requires additional attack substeps, and the attack efficiency is much more sensitive to variations of the parameters. We treat timing attacks on RSA with CRT, on RSA without CRT, and on Diffie–Hellman, as well as local timing attacks against these algorithms in the presence of basis blinding. Experiments confirm our theoretical results.


2021 ◽  
pp. 1-1
Author(s):  
Prabuddha Chakraborty ◽  
Jonathan Cruz ◽  
Christopher Posada ◽  
Sandip Ray ◽  
Swarup Bhunia

2021 ◽  
Vol 12 (01) ◽  
pp. 1-33
Author(s):  
Eloi De Chérisey ◽  
Sylvain Guilley ◽  
Olivier Rioul ◽  
Darshana Jayasinghe

Sign in / Sign up

Export Citation Format

Share Document