• DocumentCode
    181748
  • Title

    Information theoretical evaluation of the bucketing technique to mitigate timing attacks

  • Author

    Kobayashi, Y. ; Kaji, Y. ; Seki, H.

  • Author_Institution
    Nara Inst. of Sci. & Technol., Ikoma, Japan
  • fYear
    2014
  • fDate
    26-29 Oct. 2014
  • Firstpage
    561
  • Lastpage
    565
  • Abstract
    Timing attack are regarded as serious threats to many practical security mechanisms. However, it is difficult to estimate the risk of attack because we cannot predict the ability and the behavior of attackers. To tackle this issue, Köpf et al. focus on the mutual information between a secret key and timing observations that an attacker acquires. Any attacker cannot learn more information than the mutual information, and the discussion of this approach gives a certain upperbound on the risk of timing attacks. Köpf et al. adopted this approach to evaluate the contribution of a bucketing technique that was proposed by themselves. However, the mathematical discussion therein needs more improvement. The purpose of this study is to refine the discussion of Köpf, and give more precise understanding of the contribution of the bucketing technique.
  • Keywords
    information theory; private key cryptography; bucketing technique; information theoretical evaluation; mathematical discussion; mutual information; secret key; security mechanisms; timing attacks; timing observations; Approximation methods; Clocks; Cryptography; Mutual information; Random variables; Timing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory and its Applications (ISITA), 2014 International Symposium on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • Filename
    6979906