DocumentCode :
181748
Title :
Information theoretical evaluation of the bucketing technique to mitigate timing attacks
Author :
Kobayashi, Y. ; Kaji, Y. ; Seki, H.
Author_Institution :
Nara Inst. of Sci. & Technol., Ikoma, Japan
fYear :
2014
fDate :
26-29 Oct. 2014
Firstpage :
561
Lastpage :
565
Abstract :
Timing attack are regarded as serious threats to many practical security mechanisms. However, it is difficult to estimate the risk of attack because we cannot predict the ability and the behavior of attackers. To tackle this issue, Köpf et al. focus on the mutual information between a secret key and timing observations that an attacker acquires. Any attacker cannot learn more information than the mutual information, and the discussion of this approach gives a certain upperbound on the risk of timing attacks. Köpf et al. adopted this approach to evaluate the contribution of a bucketing technique that was proposed by themselves. However, the mathematical discussion therein needs more improvement. The purpose of this study is to refine the discussion of Köpf, and give more precise understanding of the contribution of the bucketing technique.
Keywords :
information theory; private key cryptography; bucketing technique; information theoretical evaluation; mathematical discussion; mutual information; secret key; security mechanisms; timing attacks; timing observations; Approximation methods; Clocks; Cryptography; Mutual information; Random variables; Timing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and its Applications (ISITA), 2014 International Symposium on
Conference_Location :
Melbourne, VIC
Type :
conf
Filename :
6979906
Link To Document :
بازگشت