Kocher: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems

20.02.2018, 10:00 – 11:00

2018/02/20 10:00-11:00

Speaker: Nina Bindel, TU Darmstadt, Cryptography and Computer Algebra Group | Location: Mornewegstraße 32 (S4|14), Room 5.3.01, Darmstadt

Organizer: Felix Günther, Christian Janson, TU Darmstadt


Abstract

This talk is the fifth edition in the seminar series “Reading the Crypto Classics”. The idea of this seminar is to jointly read classical milestone papers in the area of cryptography, to discuss their impact and understand their relevance for current research areas. The seminar is running as an Oberseminar, but at the same time meant to be a joint reading group seminar of the CROSSING Special Interest Group on Advanced Cryptography with all interested CROSSING members being invited to participate.

This issue will cover the paper Kocher: „Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems” (CRYPTO 1996) with the following abstract:

“By carefully measuring the amount of time required to perform private key operations, attackers may be able to find fixed Diffie-Hellman exponents, factor RSA keys, and break other cryptosystems. Against a vulnerable system, the attack is computationally inexpensive and often requires only known ciphertext. Actual systems are potentially at risk, including cryptographic tokens, network-based cryptosystems, and other applications where attackers can make reasonably accurate timing measurements. Techniques for preventing the attack for RSA and Diffie-Hellman are presented. Some cryptosystems will need to be revised to protect against the attack, and new protocols and algorithms may need to incorporate measures to prevent timing attacks.”

See wiki.crossing.tu-darmstadt.de/mediawiki/index.php/Science:_SIGs for further details (login required).