Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm

نویسندگان

چکیده

Abstract Montgomery’s and Barrett’s modular multiplication algorithms are widely used in exponentiation algorithms, e.g. to compute RSA or ECC operations. While algorithm has been studied extensively the literature many side-channel attacks have detected, our best knowledge no thorough analysis exists for algorithm. This article closes this gap. For both algorithm, differences of execution times caused by conditional integer subtractions, so-called extra reductions. allows even two reductions, feature increases mathematical difficulties significantly. We formulate analyse a two-dimensional Markov process, from which we deduce relevant stochastic properties within algorithms. transfer timing local (where second attack exhibits particular squarings multiplications) on However, there also differences. requires additional substeps, efficiency is much more sensitive variations parameters. treat with CRT, without Diffie–Hellman, as well against these presence basis blinding. Experiments confirm theoretical results.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Timing attacks against OpenSSL

OpenSSL is the most widely used open source SSL/TLS implementation on the internet and an immense amount of sensitive communication is trusted to be secured by it. The related cryptographic algorithms themselves are indeed very secure. However implementing the models in hardware or software introduces new kinds of channels that are not present in the mathematical model, but which can nonetheles...

متن کامل

Automated Testing against Timing Attacks

This paper provides an overview of a system which allows to integrate detection of potential timing attack with a regular test suite. The authors examine previous approaches to the problem and discuss their usefulness and fitness for the purposes of automated testing. A developer-friendly system for detecting timing issues using Valgrind is presented, and integration with Google Test is discuss...

متن کامل

Improving Tor security against timing and traffic analysis attacks with fair randomization

The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...

متن کامل

Securing On-Chip Operations against Timing Attacks

Cryptosystem designers frequently assume that secrets will be manipulated in closed, reliable computing environments. Unfortunately, actual microchips leak information about the operations they process. Cryptosystems often take slightly different amounts of time to process different inputs and also internal signals. By carefully measuring the amount of time required to perform private key opera...

متن کامل

Cache-Collision Timing Attacks Against AES

This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption. The attacks presented should be applicable to most high-speed software AES implementations...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptographic Engineering

سال: 2021

ISSN: ['2190-8508', '2190-8516']

DOI: https://doi.org/10.1007/s13389-020-00254-3