Timing Attack: An Analysis of Preliminary Data
Keywords:
Side Channel Attack, Cryptographic, Timing Attack, Modular Exponentiation, Raspberry Pi, Embedded Device, U-Boot Bare Metal, GMP Bignum Library,Abstract
Timing attacks have caused an unprecedented evolution in the present cryptographic era where more and more cryptographic applications are running on embedded systems in a wireless environment. Paul Kocher, a well-known cryptanalyst was the first to successfully implement a timing attack on a cryptosystem. Subsequently many other timing attacks have been recorded while cryptographers tirelessly work on making the schemes more resistant to these and other side channel attacks. In this work, we examine timing information leaked from the computation of g^a (mod p) and observe the timing variations of modular exponential computations by varying the key length as well as the operating frequency of our experimental Raspberry Pi board. We have chosen to compute the algebraic expression on a U-Boot Bare Metal platforms our platform and use the GMP bignum library to compute the numbers which are greater than 64 bit. We believe that the timing variations and patterns can lead to the early extraction of secret information in systems based on modular exponentiation. From our observations, there is a strong correlation of timing patterns when computing keys of the same length while the operating frequency used in the computation only affects the computational delay.References
.Zhou Y. and Feng D., “Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing,” IACR Cryptol. ePrint Arch. no. 60503014, pp. 1–34, 2005.
Kocher P., “Timing attacks on implementations of Diffie Hellman, RSA, DSS, and other systems,” Adv. Cryptology—CRYPTO’ 1996.
Dhem J., Koeune F., and Leroux P., “A practical implementation of the timing attack,” Smart Card Res, 2000.
Brumley D. and Boneh D., “Remote timing attacks are practical” Comput. Networks, 2005.
key exchange Images W., “Diffie–Hellman key exchange,”
cinqueterreliguria.net.
Alias M., Anuar Y.F., Isa M., Hashim H., “ Sieving Technique to Solve
the Discrete Log Hard Problem in Diffie-Hellman Key Exchange, pp. 129–133, 2015.
Engineering D. S., 2014. http://www.denx.de/wiki/U-Boot.
Diffie W. and Hellman M., “New directions in cryptography,” Inf. Theory, IEEE Trans, 1976.
Bellare M. and Rogaway P., “Introduction to modern cryptography,”
UCSD CSE, pp. 1–10, 2005.
Goldwasser S., “New Directions in Cryptography: Twenty Some Years Later,” in Proceedings 38th Annual Symposium on Foundations of Computer Science, pp. 314–324, 1997.
den Boer B., “Diffie-Hellman is as strong as discrete log for certain
primes,” Adv. cryptology—CRYPTO’88, pp. 530–539, 1990.
Boneh D., “The decision diffie-hellman problem,” Algorithmic number theory, pp. 1–14, 1998.
Schindler W., “A timing attack against RSA with the chinese remainder theorem,” Hardw. Embed. Syst, pp. 109–124, 2000.
Song D., Wagner D., and Tian X., “Timing Analysis of Keystrokes and Timing Attacks on SSH,” USENIX Secur. Symp.
Ali H. and Al-Salami M.,“Timing attack prospect for RSA
cryptanalysis using genetic algorithm technique,” Int. Arab J. Inf. vol.
, no.1, pp. 80–84, 2004.
Bernstein D., “Cache-timing attacks on AES,” Compute, pp. 37, 2005.
O’Hanlon M. and Tonge A., Investigation of cache timing attacks on AES. Sch. Comput. Dublin City Univ, 2005.
Crosby S., Wallach D., and Riedi R., “Opportunities and limits of remote timing attacks,” ACM Trans. Inf, vol. 12, no. 3, 2009.
Strenzke F., “A timing attack against the secret permutation in the McEliece PKC,” Post-Quantum Cryptogr. no. July. 1–29, 2010.
Downloads
Published
How to Cite
Issue
Section
License
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.