Journal
COMPUTER NETWORKS
Volume 48, Issue 5, Pages 701-716Publisher
ELSEVIER SCIENCE BV
DOI: 10.1016/j.comnet.2005.01.010
Keywords
timing attack; RSA; Chinese remainder; Montgomery reductions; SSL
Ask authors/readers for more resources
Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing attacks apply to general software systems. Specifically, we devise a timing attack against OpenSSL. Our experiments show that we can extract private keys from an OpenSSL-based web server running on a machine in the local network. Our results demonstrate that timing attacks against network servers are practical and therefore security systems should defend against them. (c) 2005 Elsevier B.V. All rights reserved.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available