TIMING ATTACK ANALYSIS ON THE HARDWARE ENCRYPTOR SHIPKA

Authors

  • А. Б. Петренко
  • О. С. Шматок
  • С. А. Шматок
  • Є. О. Агеєнко

DOI:

https://doi.org/10.18372/2310-5461.22.6817

Keywords:

the personal means of cryptographic information security SHIPKA, hardware encryptor, timing attacks, Simple Modular Exponentiation, Montgomery reduction, Chinese Remainder Theorem, Blinding

Abstract

Nowadays hardware encryptors are often used for information security; despite the equipment are more expensive than analogous software. First of all; it depends on the high level of reliability; which hardware encryptors can provide. One example of hardware encryptors is the personal means of cryptographic information security SHIPKA. It has been substantiated that the personal means of cryptographic information security SHIPKA prone to timing attacks. Algorithms used in RSA cryptosystem; such as Simple Modular Exponentiation; Montgomery reduction; Chinese Remainder Theorem; have been considered. It has been reported how timing attacks can be performed. Blinding has been suggested to be used in SHIPKA as countermeasures to prevent timing attacks on RSA.

References

Kocher Paul C. Cryptoanalisis of Diffie Hell-man, RSA, DSS, and other cryptosystem using timing attacks / Paul C. Kocher // Advances in cryptology. — 1995. — № 15. — Р. 171–183.

Brumley David. Remote timing attacks are practical / David Brumley and Dan Boneh // USENIX Security. — 2003. — № 12. — Р. 3–14.

Zhou Yong Bin. Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing / Yong Bin Zhou, Deng Guo Feng // Physical Security Testing Workshop. — 2005. — № 3. — Р. 26–60.

Mark van Cuijk Timing Attacks on RSA / Mark van Cuijk // Phedny. — 2009. — № 20. — Р. 1–5.

Schindler Werner. A timing attack against rash with the chinese remainder theorem / Werner Schindler // Cryptographic Hardware and Embedded System. — 2000. — № 2. — Р. 109–124.

Published

2014-06-20

Issue

Section

Information Security