Skip to main content

An Introduction to Timing Attacks

  • Chapter
  • First Online:
Timing Channels in Cryptography

Abstract

This chapter introduces side-channel attacks and timing attacks on implementations of cryptographic ciphers. It classifies timing attacks, presents the essential requirements for the attack to succeed, and discusses the attackers success. The chapter also outlines the contents of the book.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28, 656–715

    Google Scholar 

  2. Kocher PC, Jaffe J, Jun B (1999) Differential power analysis, CRYPTO'99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp 388–397. Springer-Verlag London

    Google Scholar 

  3. Agrawal D, Archambeault B, Rao JR, Rohatgi P (2003) The EM Side-Channel(s), Cryptographic Hardware and Embedded Systems -- CHES 2002, pp 29–45, Springer, Berlin

    Google Scholar 

  4. Genkin D, Shamir A, Tromer E (2013) RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Cryptology ePring Archive, Report 2013/857

    Google Scholar 

  5. Schaefer M, Gold B, Linde R, Scheid J (n.d.) Program Confinement in KVM/370, ACM'77 Proceedings of the 1977 annual conference, pp 404–410, ACM New York, NY, USA

    Google Scholar 

  6. Kocher P (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and other Systems. CRYPTO'96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp 104–113, Springer-Verlag, London, UK

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chester Rebeiro .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (2015). An Introduction to Timing Attacks. In: Timing Channels in Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-12370-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12370-7_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12369-1

  • Online ISBN: 978-3-319-12370-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics