Journal of South China University of Technology (Natural Science Edition) ›› 2011, Vol. 39 ›› Issue (2): 100-107.doi: 10.3969/j.issn.1000-565X.2011.02.017

• Electronics, Communication & Automation Technology • Previous Articles     Next Articles

A Side-Channel Attack Method Based on Chosen Plaintext-Timing Difference

Sun Chun-hui  Li Hui  Yang Yang  Lv Chao   

  1. Xian university of electronic science and technology, computer network and information security the key laboratory, xian in shaanxi 710071
  • Received:2010-05-31 Revised:2010-09-17 Online:2011-02-25 Published:2011-01-02
  • Contact: 孙春辉(1978-),男,博士生,主要从事密码应用与信息安全的研究 E-mail:sunch@mail.xidian.edu.cn
  • About author:孙春辉(1978-),男,博士生,主要从事密码应用与信息安全的研究
  • Supported by:

    国家自然科学基金资助项目(60772136);国家“十一五”科技支撑计划项目(2008BAH22B03,2007BAH08B01);国家“l11”计划项目(B08038)

Abstract:

Proposed in this paper is a side-channel attack method based on chosen plaintext-timing difference.This method,which is called chosen plaintext-timing attack for short and is adopted to evaluate the security of cryptography algorithms,extracts the secret key by selecting a few appropriate plaintexts which are sent to the cryptosystem and by measuring the execution time of the corresponding code,and uses the secret key to attack block cryptosystem and public cryptosystem.Moreover,DES block cipher algorithm is taken as an example to explain the implementation of the chosen plaintext-timing attack.Experimental results on a microcontroller unit indicate that the proposed attack method is effective and practical.In addition,the reason for the execution time diffe-rence existing in cryptosystem implementation is analyzed,and the corresponding countermeasures are presented.

Key words:  cryptography, data security, side-channel attack, chosen plaintext-timing attack, DES algorithm