Proceedings of the 12th ACM Conference on Computer and Communications Security 2005
DOI: 10.1145/1102120.1102140
|View full text |Cite
|
Sign up to set email alerts
|

Improving Brumley and Boneh timing attack on unprotected SSL implementations

Abstract: Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on unprotected OpenSSL implementations [2]. In this paper, we improve the efficiency of their attack by a factor of more than 10. We exploit the timing behavior of Montgomery multiplications in the table initialization phase, which allows us to increase the number of multiplications that provide useful information to reveal one of the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(47 citation statements)
references
References 11 publications
(48 reference statements)
0
43
0
Order By: Relevance
“…Timing and side channel attacks are well-know concepts in computer security and have been used to attack many kinds of systems, among others cryptographic implementations [41]- [43], OpenSSL [44], [45], SSH sessions [46], web applications [47], [48], encrypted VoIP streams [49], [50], and virtual machine environments [51]- [53].…”
Section: Related Workmentioning
confidence: 99%
“…Timing and side channel attacks are well-know concepts in computer security and have been used to attack many kinds of systems, among others cryptographic implementations [41]- [43], OpenSSL [44], [45], SSH sessions [46], web applications [47], [48], encrypted VoIP streams [49], [50], and virtual machine environments [51]- [53].…”
Section: Related Workmentioning
confidence: 99%
“…Researchers showed that such an attack could compromise remote systems over a network, which is very different from performing sidechannel attacks on smart cards that are in the attacker's possession. Improvements to the original remote timing attack made it even more practical [3].…”
Section: Security Considerationsmentioning
confidence: 99%
“…For the attacks against modular exponentiation with Montgomery multiplication [12,25,10,5], the cause of the timing channel is the extra modular reduction step that is necessary if an intermediate result is bigger than the modulus, and which is a subtraction in one branch of a conditional. The attacks against RSA in OpenSSL [10,5] as additional cause for the timing channel have the choice of the multiplication-algorithm, namely, Karatsuba in the case of equally-sized multiplicands. The attack against modular multiplication by the Blakley's algorithm [8] is also caused by an extra modular reduction in the case of an intermediate value bigger than the modulus.…”
Section: Causes Of Timing Channelsmentioning
confidence: 99%
“…Since then, they have been practically demonstrated [10], optimized [26], and evaluated [28]. A significant part [17,16,12,25,10,5,8,15,30,27,29] of timing attacks reported in the literature exploits the difference in the running time of crypto-algorithms' implementations which is caused by conditional branches or loops where conditions depend on the attacked secrets.…”
Section: Introductionmentioning
confidence: 99%