Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Hi-index | 0.00 |
Sophisticated new methods designed to break cryptographic systems have unsettled the industry's sense of security. Although most encryption algorithms are theoretically secure and remain impervious to even the most sophisticated cryptanalytic techniques, new attackslike the timing attack exploit the engineering side of network security. Factors such as branching and conditional statements, RAM cache hits, and processor instructions that run in nonfixed time all contribute to predictability and therefore to the probability of key decryption. his article discusses the implications of Paul Kocher's recent timing attack against the Diffie-Hellman key exchange protocol and Goldberg and Wagner's breach of the Netscape SSL protocol for secure transactions.