Abstract
This chapter introduces side-channel attacks and timing attacks on implementations of cryptographic ciphers. It classifies timing attacks, presents the essential requirements for the attack to succeed, and discusses the attackers success. The chapter also outlines the contents of the book.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28, 656–715
Kocher PC, Jaffe J, Jun B (1999) Differential power analysis, CRYPTO'99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, pp 388–397. Springer-Verlag London
Agrawal D, Archambeault B, Rao JR, Rohatgi P (2003) The EM Side-Channel(s), Cryptographic Hardware and Embedded Systems -- CHES 2002, pp 29–45, Springer, Berlin
Genkin D, Shamir A, Tromer E (2013) RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Cryptology ePring Archive, Report 2013/857
Schaefer M, Gold B, Linde R, Scheid J (n.d.) Program Confinement in KVM/370, ACM'77 Proceedings of the 1977 annual conference, pp 404–410, ACM New York, NY, USA
Kocher P (1996) Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and other Systems. CRYPTO'96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp 104–113, Springer-Verlag, London, UK
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (2015). An Introduction to Timing Attacks. In: Timing Channels in Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-12370-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-12370-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12369-1
Online ISBN: 978-3-319-12370-7
eBook Packages: EngineeringEngineering (R0)