Computer Science ›› 2011, Vol. 38 ›› Issue (10): 100-102.
Previous Articles Next Articles
WANG Yin-long,ZHAO Qiang,LIN Ke-cheng,LI Zhi-xiang,WANG Xi-wu ,DENG Gao-ming
Online:
Published:
Abstract: The sidcchanncl attacks take advantage of physical characteristics leaking from side channel of implementa- lion in cipher device to recover the key or other secret parameters involved in the computation running in the cipher de- vice, which blazes a new path distinct from conventional cryptanalysis methods. Equivalence relation and ectuivalence class were adopted in formal qualitative analysis against timing attacks, one type of sidcchannel attacks. hhe method of measurement in information entropy was adopted in quantitative evaluation on timing-attack ability. Formal analysis was conducted on timing attacks against RSA binary modular exponentiation algorithm, indicating that formal analysis on timing attacks could make the attack procedure intuitive and accurate, thus providing valuable reference for formal de- scription of other side channel attack approaches.
Key words: Cryptanalysis,Liming attacks,Formal approaches
WANG Yin-long,ZHAO Qiang,LIN Ke-cheng,LI Zhi-xiang,WANG Xi-wu ,DENG Gao-ming. Formal Approaches for Analyzing Timing Attacks[J].Computer Science, 2011, 38(10): 100-102.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2011/V38/I10/100
Cited