Timing attack analysis on AAβ cryptosystem

Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack dis- cussed in t...

Full description

Bibliographic Details
Main Authors: Abd Ghafar, Amir Hamzah, Kamel Ariffin, Muhammad Rezal
Format: Article
Published: Scientific Research Publishing 2014
_version_ 1825948728598462464
author Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
author_facet Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
author_sort Abd Ghafar, Amir Hamzah
collection UPM
description Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack dis- cussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding.
first_indexed 2024-03-06T08:33:36Z
format Article
id upm.eprints-35855
institution Universiti Putra Malaysia
last_indexed 2024-03-06T08:33:36Z
publishDate 2014
publisher Scientific Research Publishing
record_format dspace
spelling upm.eprints-358552016-02-10T08:49:54Z http://psasir.upm.edu.my/id/eprint/35855/ Timing attack analysis on AAβ cryptosystem Abd Ghafar, Amir Hamzah Kamel Ariffin, Muhammad Rezal Timing attack is an attack on the implementation of a cryptographic primitive. The attack collects leaked secret data via certain implementation techniques either on software or hardware. This paper provides an analysis of a theoretical timing attack on the AAβ algorithm. The attack dis- cussed in this paper gives avenues for secure implementation of AAβ against timing attacks. The simulation of the attack is important to provide invulnerability features for the algorithm in order to be implemented and embedded on applications. At the end of the attack, a method to overcome it will be introduced and it is called AAβ blinding. Scientific Research Publishing 2014-03 Article PeerReviewed Abd Ghafar, Amir Hamzah and Kamel Ariffin, Muhammad Rezal (2014) Timing attack analysis on AAβ cryptosystem. Journal of Computer and Communications, 2 (4). pp. 1-9. ISSN 2327-5219; ESSN: 2327-5227 http://www.scirp.org/journal/PaperInformation.aspx?PaperID=43819 10.4236/jcc.2014.24001
spellingShingle Abd Ghafar, Amir Hamzah
Kamel Ariffin, Muhammad Rezal
Timing attack analysis on AAβ cryptosystem
title Timing attack analysis on AAβ cryptosystem
title_full Timing attack analysis on AAβ cryptosystem
title_fullStr Timing attack analysis on AAβ cryptosystem
title_full_unstemmed Timing attack analysis on AAβ cryptosystem
title_short Timing attack analysis on AAβ cryptosystem
title_sort timing attack analysis on aaβ cryptosystem
work_keys_str_mv AT abdghafaramirhamzah timingattackanalysisonaabcryptosystem
AT kamelariffinmuhammadrezal timingattackanalysisonaabcryptosystem