Skip to main content

Timing and Side Channel Attacks

  • Chapter
  • First Online:
Cyber Security: Analytics, Technology and Automation

Abstract

How would you know the US pentagon is planning an attack on Iraq? One possible plan is to infiltrate the pentagon using spies, flipping traitors etc. But this sounds like lots of work and it is a dangerous work. That is the direct approach. Another possible plan is to ask the pizza delivery guys in the area. People planning an attack probably adds up to lots of people urgently trying to meet deadlines, staying late in the office and ordering pizza. So the pizza delivery guys know about a pending attack! The pizza delivery guys do not know the nature of the attack but they know “something is up” in the pentagon because for a few days people are staying late at the office and ordering pizza at irregular hours. The pizza approach is the side-channel attack. This attack on the pentagon is not a direct channel attack. No spies were used. No attack on the pentagon defences. It is a side channel attack. Attack on the side effects of planning something. The people who plan need to work extra time and they also need to eat.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The papers uses the term “genuinity” however the correct English term is genuiness. We will use the correct English term in this chapter.

References

  • Advanced Encryption Standard (AES) (2001) Federal Information Processing Standards Publication 197, United States National Institute of Standards and Technology (NIST)

    Google Scholar 

  • Daemen J, Rijmen V (2013) AES Proposal: Rijndael s.l, National Institute of Standards and Technology, p 1

    Google Scholar 

  • Domke F (2004) Console hacking 2004. In: CCC 2004

    Google Scholar 

  • Domke F (2006) Console hacking 2006. In: CCC, 16 Nov 2006

    Google Scholar 

  • Genkin D, Shamir A, Tromer E (2013) RSA key extraction via low-bandwidth acoustic cryptanalysis. tau.ac.il, 2013

    Google Scholar 

  • Gueron S (2012) Intel® Advanced Encryption Standard (AES) Instructions Set–Rev 3.01. s.l

    Google Scholar 

  • Kennell R, Jamieson LH (2003) Establishing the genuinity of remote computer systems. In: SSYM’03 Proceedings of the 12th USENIX Security Symposium, vol 12, pp 295–310, USENIX Association Berkeley, CA, 2003

    Google Scholar 

  • Osvik DA, Shamir A, Tromer E (2006) Cache attacks and countermeasures: the case of AES. In: Pointcheval D (ed), Topics in Cryptology—CT-RSA 2006. Lecture Notes in Computer Science, vol 3860. Springer, New York, pp 1–20

    Google Scholar 

  • Rutkowska J (2006) Introducing blue pill, the invisible things lab’s blog. http://theinvisiblethings.blogspot.fi/2006/06/introducing-blue-pill.html

  • Rutkowska J, Tereskin A (2007) IsGameOver() Anyone? Technical presentation at Black Hat, Las Vegas, Invisible Things Lab, 2 Aug 2007

    Google Scholar 

  • Schneier B (2012) Can the NSA break AES? Schneier on security blog. www.schneier.com/blog/archives/2012/03/can_the_nsa_bre.html

  • Shankar U, Chew M, Tygar JD (2004) Side effects are not sufficient to authenticate software. Report No. UCB/CSD-04-1363, Sept 2004, University of California, Berkeley, CA

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nezer Zaidenberg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Zaidenberg, N., Resh, A. (2015). Timing and Side Channel Attacks. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18302-2_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18301-5

  • Online ISBN: 978-3-319-18302-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics