scholarly journals On Aggregation of Information in Timing Attacks

Author(s):  
Itsaka Rakotonirina ◽  
Boris Kopf
2010 ◽  
Vol 33 (7) ◽  
pp. 1153-1164
Author(s):  
Xin-Jie ZHAO ◽  
Tao WANG ◽  
Yuan-Yuan ZHENG
Keyword(s):  

Author(s):  
Johannes Mittmann ◽  
Werner Schindler

AbstractMontgomery’s and Barrett’s modular multiplication algorithms are widely used in modular exponentiation algorithms, e.g. to compute RSA or ECC operations. While Montgomery’s multiplication algorithm has been studied extensively in the literature and many side-channel attacks have been detected, to our best knowledge no thorough analysis exists for Barrett’s multiplication algorithm. This article closes this gap. For both Montgomery’s and Barrett’s multiplication algorithm, differences of the execution times are caused by conditional integer subtractions, so-called extra reductions. Barrett’s multiplication algorithm allows even two extra reductions, and this feature increases the mathematical difficulties significantly. We formulate and analyse a two-dimensional Markov process, from which we deduce relevant stochastic properties of Barrett’s multiplication algorithm within modular exponentiation algorithms. This allows to transfer the timing attacks and local timing attacks (where a second side-channel attack exhibits the execution times of the particular modular squarings and multiplications) on Montgomery’s multiplication algorithm to attacks on Barrett’s algorithm. However, there are also differences. Barrett’s multiplication algorithm requires additional attack substeps, and the attack efficiency is much more sensitive to variations of the parameters. We treat timing attacks on RSA with CRT, on RSA without CRT, and on Diffie–Hellman, as well as local timing attacks against these algorithms in the presence of basis blinding. Experiments confirm our theoretical results.


1998 ◽  
Vol 01 (02n03) ◽  
pp. 221-236 ◽  
Author(s):  
Diana Richards ◽  
Brendan D. McKay ◽  
Whitman A. Richards

The conditions under which the aggregation of information from interacting agents results in a stable or an unstable collective outcome is an important puzzle in the study of complex systems. We show that if a complex system of aggregated choice respects a mutual knowledge structure, then the prospects of a stable collective outcome are considerably improved. Our domain-independent results apply to collective choice ranging from perception, where an interpretation of sense data is made by a collection of perceptual modules, to social choice, where a group decision is made from a set of preferences held by individuals.


Author(s):  
Britt Hadar ◽  
Moshe Glickman ◽  
Yaacov Trope ◽  
Nira Liberman ◽  
Marius Usher

2021 ◽  
Vol 20 (3) ◽  
pp. 474-494
Author(s):  
Yurii D. SHMIDT ◽  
Ekaterina S. PTASHKINA

Subject. The article investigates the fishing industry, its goals, targets, development trends, and structural changes. Objectives. The purpose is to develop tools to assess the magnitude and direction of structural changes in the fishing industry of the region and test it, using the Primorsky Krai case. Methods. The study employs methods of aggregation of information and creation of composite indices, expert assessments, and the hierarchy analysis technique. Results. We developed methods for quantitative assessment of the magnitude and directions of structural shifts in the fishing industry of the region. The paper includes the test results of these methods, using the fishing complex of the Primorsky Krai case. Conclusions. The developed methodological approach can be used to create tools for assessing the magnitude and direction of structural shifts in other cross-cutting sectors. Our detailed analysis of structural changes in the fishing industry of the Primorsky Krai shows serious problems in the material and technical base and in the implementation of investment and innovation processes in this area. To solve these problems, it is required to consolidate the resources and efforts of the State and the business, and to develop and implement an active structural policy in the fishing industry of the region.


2021 ◽  
pp. 97-107
Author(s):  
T. V. Tulupieva ◽  
M. V. Abramov ◽  
A. L. Tulupiev

The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this goal, the approaches to social influence and the components of social influence were analyzed. An integrated circuit of social influence is built, grounding in the context of socio-engineering attacks. Results. A model of social influence is proposed, built in the context of an attacker’s social engineering attack on a user. A new interpretation of the term user vulnerability in the context of information security has been proposed. Conclusion. The result obtained forms the potential of filling the user and attacker models with specific vulnerabilities and competencies, which will lead to a more accurate assessment of the success of the attacker’s social engineering attack on the user, due to the aggregation of information from incidents that have occurred.


Sign in / Sign up

Export Citation Format

Share Document