Timing attacks on software implementation of RSA Public Deposited

http://ir.library.oregonstate.edu/concern/graduate_projects/m039k493x

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • Timing attacks enable an attacker to extract secret information from a cryptosystem by observing timing differences with respect to different inputs given to an encryption or decryption algorithm. Werner Schindler has proposed a timing attack on smart card devices. We implemented this attack based on the same approach for RSA implementation provided by OpenSSL library. The attacking client can obtain private key information demonstrating the vulnerability of even software implementations of RSA to these attacks.
Resource Type
Date Available
Date Issued
Keyword
Subject
Rights Statement
Publisher
Language
Replaces
Additional Information
  • description.provenance : Approved for entry into archive by Laura Wilson(laura.wilson@oregonstate.edu) on 2012-08-07T21:21:13Z (GMT) No. of bitstreams: 1 2004-67.pdf: 1092773 bytes, checksum: 547db1ad017a24138b0eec426abdedc9 (MD5)
  • description.provenance : Made available in DSpace on 2012-08-07T21:21:13Z (GMT). No. of bitstreams: 1 2004-67.pdf: 1092773 bytes, checksum: 547db1ad017a24138b0eec426abdedc9 (MD5) Previous issue date: 2004
  • description.provenance : Submitted by Laura Wilson (laura.wilson@oregonstate.edu) on 2012-08-07T21:19:22Z No. of bitstreams: 1 2004-67.pdf: 1092773 bytes, checksum: 547db1ad017a24138b0eec426abdedc9 (MD5)

Relationships

In Administrative Set:
Last modified: 07/05/2017

Downloadable Content

Download PDF
Citations:

EndNote | Zotero | Mendeley

Items