2023
DOI: 10.1587/transfun.2022tap0006
|View full text |Cite
|
Sign up to set email alerts
|

Information Leakage Through Passive Timing Attacks on RSA Decryption System

Abstract: A side channel attack is a means of security attacks that tries to restore secret information by analyzing side-information such as electromagnetic wave, heat, electric energy and running time that are unintentionally emitted from a computer system. The side channel attack that focuses on the running time of a cryptosystem is specifically named a "timing attack". Timing attacks are relatively easy to carry out, and particularly threatening for tiny systems that are used in smart cards and IoT devices because t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…In this section, we review the most related works in the existing literature. With the rapid improvement of computer technology, the RSA (Rivest-Shamir-Adleman) [28] algorithm has faced significant security threats. In order to ensure the security and reliability of electronic signatures, China has released the independently developed SM2 algorithm based on elliptic curves [29].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we review the most related works in the existing literature. With the rapid improvement of computer technology, the RSA (Rivest-Shamir-Adleman) [28] algorithm has faced significant security threats. In order to ensure the security and reliability of electronic signatures, China has released the independently developed SM2 algorithm based on elliptic curves [29].…”
Section: Related Workmentioning
confidence: 99%
“…Another strategy is the side-channel attack which aims to obtain information based upon hardware faults instead of the flaw in the algorithm itself. This attack includes a timing attack [44] and a fault analysis attack on RSA [44,45].…”
Section: Rsamentioning
confidence: 99%