Timing Attacks
We discuss timing attacks in more detail in Part Two, as they
relate to public-key algorithms. However, the issue may also be relevant for
symmetric ciphers. In essence, a timing attack is one in which information about
the key or the plaintext is obtained by observing how long it takes a given
implementation to perform decryptions on various ciphertexts. A timing attack
exploits the fact that an encryption or decryption algorithm often takes
slightly different amounts of time on different inputs. [HEVI99] reports on an approach that
yields the Hamming weight (number of bits equal to one) of the secret key. This
is a long way from knowing the actual key, but it is an intriguing first step.
The authors conclude that DES appears to be fairly resistant to a successful
timing attack but suggest some avenues to explore. Although this is an
interesting line of attack, it so far appears unlikely that this technique will
ever be successful against DES or more powerful symmetric ciphers such as triple
DES and AES.
No comments:
Post a Comment