Timing Channels in Cryptography A Micro-Architectural Perspective
This book deals with timing attacks on software implementations of encryption algorithms. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. Modern superscalar microprocessors
- PDF / 6,421,931 Bytes
- 162 Pages / 439.44 x 666.24 pts Page_size
- 48 Downloads / 211 Views
Chester Rebeiro • Debdeep Mukhopadhyay Sarani Bhattacharya
Timing Channels in Cryptography A Micro-Architectural Perspective
2123
Chester Rebeiro Columbia University New York New York USA
Sarani Bhattacharya Department of Computer Science and Engin IIT Kharagpur Kharagpur India
Debdeep Mukhopadhyay Indian Institute of Technology Kharagpur West Bengal India
ISBN 978-3-319-12369-1 ISBN 978-3-319-12370-7 (eBook) DOI 10.1007/978-3-319-12370-7 Library of Congress Control Number: 2014954350 Springer Cham Heidelberg New York Dordrecht London © Springer International Publishing Switzerland 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com)
Foreword
With the publication of the Data Encryption Standard DES in 1977 and the invention of public key cryptography in the 1980s, cryptography has moved into civil applications. This was pushed by the electronic revolution, which needs cryptography to create an electronic equivalent of the real world into the digital world. Cryptography is used to provide confidentiality, digital signatures, anonymity, payments, electronic transactions, elections, and many more. Cryptography and cryptographic protocols by themselves do not provide security: they need a digital platform that executes the algorithms and protocols. In the early days, these platforms were computers and servers sitting in well protected computer rooms and offices. The main concern when implementing the algorithms and protocols was efficiency, as cryptographic algorithms are typically very computationally demanding. The attacker model assumed that the computer platforms themselves were well protected and that only the result of the encryption, the ciphertext, has to travel over insecure communication channels, such as cables or satellite communication or tapes that are transported between bank offices and the bank headquarters. However, as the electronic revolution expanded,
Data Loading...