Sciweavers

CCS
2005
ACM

Improving Brumley and Boneh timing attack on unprotected SSL implementations

13 years 10 months ago
Improving Brumley and Boneh timing attack on unprotected SSL implementations
Since the remarkable work of Kocher [7], several papers considering different types of timing attacks have been published. In 2003, Brumley and Boneh presented a timing attack on unprotected OpenSSL implementations [2]. In this paper, we improve the efficiency of their attack by a factor of more than 10. We exploit the timing behavior of Montgomery multiplications in the table initialization phase, which allows us to increase the number of multiplications that provide useful information to reveal one of the prime factors of RSA moduli. We also present other improvements, which can be applied to the attack in [2]. Categories and Subject Descriptors E.3 [Data Encryption]: [Public key cryptosystems, Code breaking] General Terms Security Keywords side-channel cryptanalysis, timing attacks, RSA
Onur Aciiçmez, Werner Schindler, Çet
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where CCS
Authors Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
Comments (0)