What classes of side-channel attacks are applicable to RSA implementation and what is the efficiency rate ?
Asked
Active
Viewed 2,270 times
-2
-
6Actually, you don't have a side channel attack on "RSA" (or any crypto primitive); you have a side channel attack on an implementation of RSA. Some implementations will be vulnerable to a variety of side channel attacks; others will be far more resistant (the hard-core side channel guys will say nothing is totally immune...) – poncho Sep 22 '18 at 13:00
-
Other relevant questions: https://crypto.stackexchange.com/q/59334 https://crypto.stackexchange.com/q/25163 https://crypto.stackexchange.com/q/52214 – Squeamish Ossifrage Jun 17 '19 at 19:11
2 Answers
2
One type of side channel attacks on RSA is timing attack. It explots the timing variability of operation implementation. To secure against RSA timing attack, constant-time operations are implemented.

hardyrama
- 2,126
- 1
- 16
- 40
0
As far as I can find out there one of "Paul Carl Kocher" development was Timing Attack, that can break implementations of RSA, a timing attack is a side channel attack that attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms.

R1w
- 1,952
- 4
- 20
- 45
-
3Actually, Paul's work was far more focused on various power side channel attacks (for one, those give far more information to the attacker than a simple timing measurement). – poncho Sep 22 '18 at 12:57