Timing Attack: An Analysis of Preliminary Data


  • Yasin Fitri Alias Faculty of Electrical Engineering, Universiti Teknologi Mara, Selangor, Malaysia.
  • Mohd Anuar Mat Isa Faculty of Electrical Engineering, Universiti Teknologi Mara, Selangor, Malaysia.
  • Habibah Hashim Faculty of Electrical Engineering, Universiti Teknologi Mara, Selangor, Malaysia.


Side Channel Attack, Cryptographic, Timing Attack, Modular Exponentiation, Raspberry Pi, Embedded Device, U-Boot Bare Metal, GMP Bignum Library,


Timing attacks have caused an unprecedented evolution in the present cryptographic era where more and more cryptographic applications are running on embedded systems in a wireless environment. Paul Kocher, a well-known cryptanalyst was the first to successfully implement a timing attack on a cryptosystem. Subsequently many other timing attacks have been recorded while cryptographers tirelessly work on making the schemes more resistant to these and other side channel attacks. In this work, we examine timing information leaked from the computation of g^a (mod p) and observe the timing variations of modular exponential computations by varying the key length as well as the operating frequency of our experimental Raspberry Pi board. We have chosen to compute the algebraic expression on a U-Boot Bare Metal platforms our platform and use the GMP bignum library to compute the numbers which are greater than 64 bit.  We believe that the timing variations and patterns can lead to the early extraction of secret information in systems based on modular exponentiation. From our observations, there is a strong correlation of timing patterns when computing keys of the same length while the operating frequency used in the computation only affects the computational delay.


.Zhou Y. and Feng D., “Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing,” IACR Cryptol. ePrint Arch. no. 60503014, pp. 1–34, 2005.

Kocher P., “Timing attacks on implementations of Diffie Hellman, RSA, DSS, and other systems,” Adv. Cryptology—CRYPTO’ 1996.

Dhem J., Koeune F., and Leroux P., “A practical implementation of the timing attack,” Smart Card Res, 2000.

Brumley D. and Boneh D., “Remote timing attacks are practical” Comput. Networks, 2005.

key exchange Images W., “Diffie–Hellman key exchange,”


Alias M., Anuar Y.F., Isa M., Hashim H., “ Sieving Technique to Solve

the Discrete Log Hard Problem in Diffie-Hellman Key Exchange, pp. 129–133, 2015.

Engineering D. S., 2014. http://www.denx.de/wiki/U-Boot.

Diffie W. and Hellman M., “New directions in cryptography,” Inf. Theory, IEEE Trans, 1976.

Bellare M. and Rogaway P., “Introduction to modern cryptography,”

UCSD CSE, pp. 1–10, 2005.

Goldwasser S., “New Directions in Cryptography: Twenty Some Years Later,” in Proceedings 38th Annual Symposium on Foundations of Computer Science, pp. 314–324, 1997.

den Boer B., “Diffie-Hellman is as strong as discrete log for certain

primes,” Adv. cryptology—CRYPTO’88, pp. 530–539, 1990.

Boneh D., “The decision diffie-hellman problem,” Algorithmic number theory, pp. 1–14, 1998.

Schindler W., “A timing attack against RSA with the chinese remainder theorem,” Hardw. Embed. Syst, pp. 109–124, 2000.

Song D., Wagner D., and Tian X., “Timing Analysis of Keystrokes and Timing Attacks on SSH,” USENIX Secur. Symp.

Ali H. and Al-Salami M.,“Timing attack prospect for RSA

cryptanalysis using genetic algorithm technique,” Int. Arab J. Inf. vol.

, no.1, pp. 80–84, 2004.

Bernstein D., “Cache-timing attacks on AES,” Compute, pp. 37, 2005.

O’Hanlon M. and Tonge A., Investigation of cache timing attacks on AES. Sch. Comput. Dublin City Univ, 2005.

Crosby S., Wallach D., and Riedi R., “Opportunities and limits of remote timing attacks,” ACM Trans. Inf, vol. 12, no. 3, 2009.

Strenzke F., “A timing attack against the secret permutation in the McEliece PKC,” Post-Quantum Cryptogr. no. July. 1–29, 2010.




How to Cite

Alias, Y. F., Mat Isa, M. A., & Hashim, H. (2017). Timing Attack: An Analysis of Preliminary Data. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1-4), 29–32. Retrieved from https://jtec.utem.edu.my/jtec/article/view/1774