KEYWORDS: Local area networks, Solid state lighting, CRTs, Calibration, Detection and tracking algorithms, Cryptanalysis, Switching, Binary data, Error analysis, Information assurance
Today, the specific implementation of a cryptosystem is of possibly greater importance than the underlying cryptographic algorithm itself. Through side-channel cryptanalysis, an adversary may deduce a secret key just by monitoring implementation-specific side channels, such as execution time or power consumption during a cryptographic operation. In this paper, we describe a successful remote timing attack against a server running a protocol similar to SSL. Using a fully-automated attack on Chinese Remaindering Theorem (CRT) implementations of RSA, we show it is practical to recover a 1024-bit key in under an hour over a local area network.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.