All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Program Demonstrating the Timing Analysis

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26220%2F13%3APU105339" target="_blank" >RIV/00216305:26220/13:PU105339 - isvavai.cz</a>

  • Result on the web

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    Program Demonstrating the Timing Analysis

  • Original language description

    The paper describes the timing analysis which examines the time dependence of the cryptographic algorithm on sensitive information stored in cryptographic device. The operations of the cryptographic algorithm have different duration depending on the input data and secret key value. Timing analysis represents the typical example of side channel attacks and this analysis is mostly used for the explanation of basic side channel principles. The paper describes two typical examples of timing analysis. The first example is the timing analysis of a password verification algorithm and the second one is the timing analysis of the RSA (Rivest, Shamir, Adleman) algorithm. We implemented a program in MATLAB to explain the timing analysis to students. This programdemonstrates the basic principles of side channel cryptanalysis and provides simple timing analysis using the RSA implementation in an understandable way.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    JA - Electronics and optoelectronics

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/FR-TI4%2F647" target="_blank" >FR-TI4/647: *Integration server with cryptographic protection</a><br>

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2013

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Proceedings of 15th International Conference on Research in Telecommunication Technologies

  • ISBN

    978-80-227-4026-5

  • ISSN

  • e-ISSN

  • Number of pages

    5

  • Pages from-to

    1-5

  • Publisher name

    Neuveden

  • Place of publication

    Neuveden

  • Event location

    Senec

  • Event date

    Sep 11, 2013

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article