Эта статья является препринтом и не была отрецензирована.
О результатах, изложенных в препринтах, не следует сообщать в СМИ как о проверенной информации.
Алгоритм комбинирования акустического и электромагнитного каналов для осуществления атаки на RSA в программе GnuPG
1. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems / Kocher, Paul // Advances in Cryptology – CRYPTO’96 : 1996, Vol. 1109, P.104-113
2. Optical fault induction attacks / S. Skorobogatov, R. Anderson // CHES: UK, 2003. p. 2-12
3. Physical model of sensitive data leakage from PC-based cryptographic systems / Levina A., Sleptsova D., Mostovoy R., Tsvetkov L. // Journal of Cryptographic Engineering - 2019, Vol. 9, No. 4, pp. 393-400
4. Remote timing attacks are practical / David Brumley and Dan Boneh // Proceedings of the 12th conference on USENIX Security Symposium : 2003, Vol. 12
5. Remote timing attacks are still practical / Billy Bob Brumley and Nicola Tuveri // In ESORICS, pages 355–371, 2011
6. A case study exploring side-channel attacks on pet wearables / Levina, A., Varyukhin, V., Kaplun, D., Zamansky, A., van der Linden, D. // IAENG International Journal of Computer Science, 2021, 48(4)
7. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis / Genkin, D., Shamir, A., Tromer, E. // In: Garay, J.A., Gennaro, R. (eds) Advances in Cryptology – CRYPTO 2014. CRYPTO 2014. Lecture Notes in Computer Science, vol 8616. Springer, Berlin, Heidelberg
8. Acceleration of the acoustic channel attack on the RSA algorithm in GnuPG software by combination with electromagnetic leaks / Krasov K.S., Levina A.B. // 8th International Conference on Communication and Network Technology, 2024
9. Fundamentals of theoretical electrical engineering: A textbook. 2nd ed. / Yu.A. Bychkov, V.M. Zolotnitsky, E.P. Chernyshev, A.N. Belyanin // St.Petersburg: Lan Publishing House, 2008. 592 pages
10. RFC 4880: OpenPGP Message Format / Callas, L. Donnerhacke, H. Finney, D. Shaw, and R. Thayer // Nov. 2007. [Online]. URL: https://www.rfceditor.org/rfc/rfc4880.txt
11. Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities / Coppersmith, D. // J. Cryptology 10, 233–260 (1997)
12. Accurate method for calculating the required number of repeated experiments / Boyko A. F., Kudennikov E. Yu. // Vestnik BSTU named after V. G. Shukhov
13. Methods of processing the results of a physical experiment / Morozov V.V., Sheinman I.L., Sheinman J.S. // SPbSETU «LETI» named after V.I.Ulyanov (Lenin), Saint-Petersburg, Russia, 2020
14. Cache Side-Channel Attack on Mail User Agent / H. Kim, H. Yoon, Y. Shin and J. Hur // 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 2020, pp. 236-238
15. PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring / M. Wu, S. McCamant, P. -C. Yew and A. Zhai // 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), Storrs, CT, USA, 2022, pp. 25-36