Abstract
How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza at irregular hours. The pizza approach is the side-channel attack. This attack on the pentagon is not a direct channel attack. No spies were used. No attack on the pentagon defences. It is a side channel attack. Attack on the side effects of planning something. The people who plan need to work extra time and they also need to eat.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The papers uses the term “genuinity” however the correct English term is genuiness. We will use the correct English term in this chapter.
References
Advanced Encryption Standard (AES) (2001) Federal Information Processing Standards Publication 197, United States National Institute of Standards and Technology (NIST)
Daemen J, Rijmen V (2013) AES Proposal: Rijndael s.l, National Institute of Standards and Technology, p 1
Domke F (2004) Console hacking 2004. In: CCC 2004
Domke F (2006) Console hacking 2006. In: CCC, 16 Nov 2006
Genkin D, Shamir A, Tromer E (2013) RSA key extraction via low-bandwidth acoustic cryptanalysis. tau.ac.il, 2013
Gueron S (2012) Intel® Advanced Encryption Standard (AES) Instructions Set–Rev 3.01. s.l
Kennell R, Jamieson LH (2003) Establishing the genuinity of remote computer systems. In: SSYM’03 Proceedings of the 12th USENIX Security Symposium, vol 12, pp 295–310, USENIX Association Berkeley, CA, 2003
Osvik DA, Shamir A, Tromer E (2006) Cache attacks and countermeasures: the case of AES. In: Pointcheval D (ed), Topics in Cryptology—CT-RSA 2006. Lecture Notes in Computer Science, vol 3860. Springer, New York, pp 1–20
Rutkowska J (2006) Introducing blue pill, the invisible things lab’s blog. http://theinvisiblethings.blogspot.fi/2006/06/introducing-blue-pill.html
Rutkowska J, Tereskin A (2007) IsGameOver() Anyone? Technical presentation at Black Hat, Las Vegas, Invisible Things Lab, 2 Aug 2007
Schneier B (2012) Can the NSA break AES? Schneier on security blog. www.schneier.com/blog/archives/2012/03/can_the_nsa_bre.html
Shankar U, Chew M, Tygar JD (2004) Side effects are not sufficient to authenticate software. Report No. UCB/CSD-04-1363, Sept 2004, University of California, Berkeley, CA
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Zaidenberg, N., Resh, A. (2015). Timing and Side Channel Attacks. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-18302-2_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18301-5
Online ISBN: 978-3-319-18302-2
eBook Packages: EngineeringEngineering (R0)