Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique
This paper presents an approach to cryptanalysis of RSA cryptosystem based on the application of genetic algorithm. The search utilizes the idea of timing attack as computation time information may leak due to different modular operations throughout the RSA encoding. This approach suggests a speed up process, aiming at reducing the required number of plaintext-ciphertext samples needed for a successful timing attack. The proposed notion of timing attack outlined in this work with its preliminary implementation, have given encouraging results on RSA cryptosystem samples. Further work carried on to implement the idea of genetic algorithm technique to practical RSA system has demonstrated encouraging results.
[1] Dhem J. F., “Design of an Efficient Public- Kcryptographic Library for RISC-Based Smart Cards,” PhD Thesis, Universite Catholique de Louvain-UCL Crypto Group-Laboratoire de Microelectronique (DICE), May 1998.
[2] Dhem J. F., Koeune F., Leroux P. A., Mestre P., Quisquater J. J., and Willems J. L., “A Practical Implementation of Timing Attack,” Technical Report Series, Universite Catholique de Louvain- ULC Crypto Group, 1998. 0 20 40 60 80 100 120 140 Number of generations Average Population fitn ess 84 The International Arab Journal of Information Technology, Vol. 1, No. 1, January 2004
[3] Haches G., Koeume F., and Quisquater J. J., “Timing Attack: What Can be Achieved by a Powerful Adversary,” Technical Report, Universite Catholique de Louvain-UCL Crypto Group, URL: http://www.dice.ucl.ac.be/crypto, 1999.
[4] Kocher P. C., “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,” in Koblitz N. (Ed), Advances in Cryptology (CRYPTO’96), Santa Barbara, California, Springer, vol. 1109 of LNCS, pp. 104-113, 1996.
[5] Kocher P. C., Jaffe J., and Jun B., “Introduction to Differential Power Analysis and Related Attacks,” http://www.cryptography.com/ dpa/, 1998.
[6] Koeune F. and Quisquater J. J., “A Timing Attack Against Rijndael,” Technical Report, Universite Catholique de Louvain-UCL Crypto Group, 1999.
[7] Kolodziejczyk J., “The Application of Genetic Algorithm in Cryptoanalysis of Knapsack Cipher,” http:// www.cryptography. com/ dpa…/, 1998.
[8] Liepins G. E. and Hillard M. R., “Genetic Algorithms: Foundations and Applications,” Annals of Operations Research, vol. 21, pp. 31- 58, 1989.
[9] Matthew R. J., “The Use of Genetic Algorithms in Cryptanalysis,” Cryptologia, vol. 17, no. 2, pp. 187-201, 1993.
[10] Rivest R., Shamir A., and Adlemen L., “Method for Obtaining Digital Signature and Public Key Cryptosystem,” Communications of ACM, vol. 21, no. 2, pp. 120-126, 1978.
[11] Schneier B., “Applied Cryptography,” John Wiley & Sons, 1996.
[12] Spillman R., Janssen M., Nelson B., and Kepner M., “Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Cipher,” Cryptologia, vol. 17, no.1, 1993. Hamza Ali BSc in physics from Basrah University 1968, MSc in electronics from University of London 1973 and PhD in computer engineering from University of London, 1977. Previously he worked in Basrah University, Iraq, Shatt Alarab University College, Iraq, Aizu University, Japan, and currently associate professor at the Computer Science Department, Zarka Private University, Jordan. His research interest includes computer data and networks security, authentication and digital signature, recognition of Arabic script and neural networks. Mikdam Al-Salami obtained his MSc and BSc in computer science from Basrah University, Iraq, 1996 and 1999, respectively. Previously he worked at Ar-Rafidain University College, Iraq. Currently, he is a lecturer at the Computer Science Department, Zarka Private University, Jordan. His research areas include cryptography in computer systems, authentication and management of data protection.