obtain information about the secret or private key by recording and analyzing
the time used for cryptographic operations that involve the key. Kocher
observed that RC5 may be sub ject to timing attacks if RC5 is implemented
on platforms for which the time for computing a single rotation is proportional
to the rotation amount. However, RC5 can easily be implemented in
suchaway as to be invulnerable to timing attacks. Many modern processors
have constant-time rotation, addition, and exclusive-or instructions. Other
processors may have a rotation or shift time that depends linearly with the
amount of rotation, but in this case it is usually easy to arrange the work so
that the total compute time is data-independent, for example, by computing
a rotate of t bits using a left-shift of t bits and a right-shift of w
t bits.
In either case, the RC5 encrypt/decrypt time is data-independent, causing
any potential timing attacks to fail
obtain information about the secret or private key by recording and analyzing
the time used for cryptographic operations that involve the key. Kocher
observed that RC5 may be sub ject to timing attacks if RC5 is implemented
on platforms for which the time for computing a single rotation is proportional
to the rotation amount. However, RC5 can easily be implemented in
suchaway as to be invulnerable to timing attacks. Many modern processors
have constant-time rotation, addition, and exclusive-or instructions. Other
processors may have a rotation or shift time that depends linearly with the
amount of rotation, but in this case it is usually easy to arrange the work so
that the total compute time is data-independent, for example, by computing
a rotate of t bits using a left-shift of t bits and a right-shift of w
t bits.
In either case, the RC5 encrypt/decrypt time is data-independent, causing
any potential timing attacks to fail
การแปล กรุณารอสักครู่..