Abstract
Building on the work of Kocher (1996), Jaffe and Yun (1998), we discuss the notion of side-channel cryptanalysis: cryptanalysis using implementation data. We discuss the notion of side-channel attacks and the vulnerabilities they introduce, demonstrate side-channel attacks against three product ciphers – timing attack against IDEA, processor-flag attack against RC5, and Hamming weight attack against DES – and then generalize our research to other cryptosystems.
Get full access to this article
View all access options for this article.
