Attributes | Values |
---|
rdf:type
| |
Description
| - The paper describes the timing analysis which examines the time dependence of the cryptographic algorithm on sensitive information stored in cryptographic device. The operations of the cryptographic algorithm have different duration depending on the input data and secret key value. Timing analysis represents the typical example of side channel attacks and this analysis is mostly used for the explanation of basic side channel principles. The paper describes two typical examples of timing analysis. The first example is the timing analysis of a password verification algorithm and the second one is the timing analysis of the RSA (Rivest, Shamir, Adleman) algorithm. We implemented a program in MATLAB to explain the timing analysis to students. This program demonstrates the basic principles of side channel cryptanalysis and provides simple timing analysis using the RSA implementation in an understandable way.
- The paper describes the timing analysis which examines the time dependence of the cryptographic algorithm on sensitive information stored in cryptographic device. The operations of the cryptographic algorithm have different duration depending on the input data and secret key value. Timing analysis represents the typical example of side channel attacks and this analysis is mostly used for the explanation of basic side channel principles. The paper describes two typical examples of timing analysis. The first example is the timing analysis of a password verification algorithm and the second one is the timing analysis of the RSA (Rivest, Shamir, Adleman) algorithm. We implemented a program in MATLAB to explain the timing analysis to students. This program demonstrates the basic principles of side channel cryptanalysis and provides simple timing analysis using the RSA implementation in an understandable way. (en)
|
Title
| - Program Demonstrating the Timing Analysis
- Program Demonstrating the Timing Analysis (en)
|
skos:prefLabel
| - Program Demonstrating the Timing Analysis
- Program Demonstrating the Timing Analysis (en)
|
skos:notation
| - RIV/00216305:26220/13:PU105339!RIV14-MPO-26220___
|
http://linked.open...avai/predkladatel
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26220/13:PU105339
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Password verification algorithm, RSA, Side channel analysis, Timing analysis. (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of 15th International Conference on Research in Telecommunication Technologies
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Hajný, Jan
- Malina, Lukáš
- Martinásek, Zdeněk
- Zeman, Václav
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |