Provided by: G.H. Raisoni College of Engineering
Cryptosystems often take slightly different amounts of running time depending on the input and the used key. This timing information, extracted from the decryption process, can be used to derive information about the secret key. This new class of attacks on implementations of cryptosystems is named Timing Attacks. Timing attacks attempt to exploit the variations in computational time for private key operations to guess the private key. This type of attack is primitive in the sense that no specialized equipment is needed. An attacker can break a key by simply measuring the computational time required by the user inputs and recording those user inputs. This paper is aimed to analyze the performance of Timing Attack on Elliptic Curve Cryptosystem.