Timing Attack ad RSA

Riferimenti
Precedente Home Successiva

 

Home
RSA
Timing Attack
Dettagli dell'attacco
RSAREF 2.0
Analisi
Contromisure
Conclusioni
Riferimenti
Appendice A
Appendice B
Appendice C

Documenti

  1. D.Brumley e D. Boneh, "Remote timing attacks are practical", http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf

  2. J.F. Dhem, F. Koeune, P.-A. Leroux, P. Mestré, J.-J. Quisquater, e J.-L. Willems, "A practical implementation of the timing attack", www.cs.jhu.edu/~fabian/courses/CS600.624/Timing-full.pdf

  3. P.Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems", www.cryptography.com/resources/whitepapers/TimingAttacks.pdf

  4.  S.Levy, "The open secret", scritto il 7 Aprile 1999, http://www.wired.com/wired/archive/7.04/crypto.html

  5. Progetto OpenSSL : http://www.openssl.org

  6. R. L. Rivest, A. Shamir, L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems". (1978).

  7. RSA Laboratories. http://www.rsasecurity.com/rsalabs/node.asp?id=2098

  8. B.Schneier, "Risks of relying on cryptography", Communications of the ACM , vol. 42, numero 10, Ottobre 1999,  http://www.schneier.com/essay-021.html

  9. US-CERT Vulnerability Note VU#997481, http://www.kb.cert.org/vuls/id/997481

  10. G.Blom. Probability and Statistics: Theory and Applications. Springer-Verlag, 1989.

  11. J.F. Dhem,F. Koeune,P .A. Leroux,P . Mestr´e,J.J. Quisquater,and J.L.Willems. A Practical Implementation of the Timing Attack. Technical Report CG-1998/1,Univ ersit´e catholique de Louvain,1998. http://www.dice.ucl.ac.be/crypto.

  12. D. Chaum. Blind Signatures for Untraceable Payments. In R. Rivest and A. Sherman and D. Chaum,editor, Advances in Cryptology - Proceedings of CRYPTO 82,volume 0,pagine 199–203. Plenum Press,1983.

  13. A. Hevia and M. Kiwi. Strength of Two Data Encryption Standard Implementation Under Timing Attacks. ACM Transactions on Information and System Security,2(4):416–437,Novembre 1999.

  14. W. Schindler. A Timing Attack against RSA with the Chinese Remainder Theorem. In C¸ . K. Ko¸c and C. Paar,editors, Cryptographic Hardware and Embedded Systems - CHES 2000,v olume 1965 of LNCS,pagine 109–124. Springer-Verlag,Agosto 2000.

 

Precedente Home Successiva