Implementing a Differential Timing Analysis Attack on RSA Decryption
Borrowed with permission from Bennet Yee
Due: 11 AM on March 13, 2009


In this lab you will be implementing a timing attack on a simulated "smart card" RSA implementation in order to recover secret/private keys used in the decryption process. You will be implementing a chosen ciphertext attack (known ciphertext and known modulus) and will have access to the code that performs the decryption. You may work in groups of 2-3 people for this project. If you would like a unix group set up for your project members then please create and populate your group using the grouper tool.


The details






What you give us


What you're graded on


Resources


Tips