Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel

Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma

Research output: Contribution to journalArticlepeer-review

Abstract

In side-channel testing, the standard timing analysis works when the vendor can provide a measurement to indicate the execution time of cryptographic algorithms. In this paper, we find that there exists timing leakage in power/electromagnetic channels, which is often ignored in traditional timing analysis. Hence a new method of timing analysis is proposed to deal with the case where execution time is not available. Different execution time leads to different execution intervals, affecting the locations of plaintext and ciphertext transmission. Our method detects timing leakage by studying changes in plaintext-ciphertext correlation when traces are aligned forward and backward. Experiments are then carried out on different cryptographic devices. Furthermore, we propose an improved timing analysis framework which gives appropriate methods for different scenarios.

Original languageEnglish
Pages (from-to)1
Number of pages1
JournalIEEE Transactions on Information Forensics and Security
DOIs
Publication statusAccepted/In press - 2024

Keywords

  • Correlation
  • IEC Standards
  • ISO Standards
  • Plaintext-ciphertext correlation
  • Side-channel analysis
  • Standards
  • Testing
  • Time measurement
  • Timing
  • Timing analysis
  • Timing leakage

Fingerprint

Dive into the research topics of 'Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel'. Together they form a unique fingerprint.

Cite this