2009 22nd IEEE Computer Security Foundations Symposium 2009
DOI: 10.1109/csf.2009.21
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure and Efficient Countermeasure against Timing Attacks

Abstract: We show that the amount of information about the key that an unknown-message attacker can extract from a deterministic side-channel is bounded from above by |O| log 2 (n + 1) bits, where n is the number of side-channel measurements and O is the set of possible observations. We use this bound to derive a novel countermeasure against timing attacks, where the strength of the security guarantee can be freely traded for the resulting performance penalty. We give algorithms that efficiently and optimally adjust thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
129
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 80 publications
(130 citation statements)
references
References 17 publications
1
129
0
Order By: Relevance
“…Finally, the model of side-channels presented in this paper serves as the basis for the quantitative analysis of systems with respect to unknown-message attacks [4,31]. By comparing the side-channel leakage in unknown-message attacks to that in adaptive attacks, one can quantify the resistance gained by applying message-blinding, the state-of-the art countermeasure against timing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the model of side-channels presented in this paper serves as the basis for the quantitative analysis of systems with respect to unknown-message attacks [4,31]. By comparing the side-channel leakage in unknown-message attacks to that in adaptive attacks, one can quantify the resistance gained by applying message-blinding, the state-of-the art countermeasure against timing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Köpf and Dürmuth (Köpf and Dürmuth 2009) have recently argued that, however effective in practice, the exact degree of protection provided by blinding remains unclear. They therefore propose to enhance blinding with bucketing, a technique by which the algorithm's execution times are adjusted so as to always fall in one of few predefined values.…”
Section: Timing Leaks and Blinding In Modular Exponentiationmentioning
confidence: 99%
“…They rely on the informationtheoretic method of types to determine the asymptotic behaviour of the considered quantities, as we do in the present paper. An application of their setting to the modular exponentiation algorithm is the subject of (Köpf and Dürmuth 2009), where the effect of bucketing on security of rsa is examined (see Section 5). This study has recently been extended to the case of one-try attacks by Köpf and Smith in (Köpf and Smith 2010).…”
Section: Related Workmentioning
confidence: 99%
“…They rely on the information-theoretic method of types to determine the asymptotic behaviour of the considered quantities, as we do in the present paper. An application of their setting to the modular exponentiation algorithm is the subject of Köpf and Dürmuth (2009), where the effect of bucketing on security of rsa is examined (see Section 5). This study has recently been extended to the case of one-try attacks by Köpf and Smith (2010).…”
Section: Related Workmentioning
confidence: 99%