<?xml version="1.0" encoding="UTF-8"?>
<article article-type="research-article" dtd-version="1.3" xml:lang="ru" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://metafora.rcsi.science/xsd_files/journal3.xsd">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">moitvivt</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Моделирование, оптимизация и информационные технологии</journal-title>
        <trans-title-group xml:lang="en">
          <trans-title>Modeling, Optimization and Information Technology</trans-title>
        </trans-title-group>
      </journal-title-group>
      <issn pub-type="epub">2310-6018</issn>
      <publisher>
        <publisher-name>Издательство</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.26102/2310-6018/2018.23.4.034</article-id>
      <article-id pub-id-type="custom" custom-type="elpub">544</article-id>
      <title-group>
        <article-title xml:lang="ru">АТАКИ ПО ВРЕМЕНИ НА ИНФОРМАЦИЮ В НЕДОВЕРЕННЫХ СРЕДАХ</article-title>
        <trans-title-group xml:lang="en">
          <trans-title>TIMING ATTACKS ON INFORMATION IN UNTRUSTED ENVIRONMENTS</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author" corresp="yes">
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Минаев</surname>
              <given-names>Владимир Александрович</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Minaev</surname>
              <given-names>Vladimir Alexandrovich</given-names>
            </name>
          </name-alternatives>
          <email>m1va@yandex.ru</email>
          <xref ref-type="aff">aff-1</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Зеленцова</surname>
              <given-names>Екатерина Валентиновна</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Zelentsova</surname>
              <given-names>Ekaterina Valentinovna</given-names>
            </name>
          </name-alternatives>
          <email>katez@mail.ru</email>
          <xref ref-type="aff">aff-2</xref>
        </contrib>
        <contrib contrib-type="author" corresp="yes">
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Петров</surname>
              <given-names>Сергей Сергеевич</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Petrov</surname>
              <given-names>Sergey Sergeevich</given-names>
            </name>
          </name-alternatives>
          <xref ref-type="aff">aff-3</xref>
        </contrib>
      </contrib-group>
      <aff-alternatives id="aff-1">
        <aff xml:lang="ru">ФГБОУ ВО «Московский государственный технический университет» им. Н.Э. Баумана МГТУ (национальный исследовательский университет)</aff>
        <aff xml:lang="en"/>
      </aff-alternatives>
      <aff-alternatives id="aff-2">
        <aff xml:lang="ru">ФГБОУ ВО «Московский государственный технический университет» им. Н.Э. Баумана МГТУ (национальный исследовательский университет)</aff>
        <aff xml:lang="en">Bauman Moscow State Technical University</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-3">
        <aff xml:lang="ru">ФГБОУ ВО «Московский государственный технический университет» им. Н.Э. Баумана МГТУ (национальный исследовательский университет)</aff>
        <aff xml:lang="en">Bauman Moscow State Technical University</aff>
      </aff-alternatives>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <elocation-id>10.26102/2310-6018/2018.23.4.034</elocation-id>
      <permissions>
        <copyright-statement>Copyright © Авторы, 2026</copyright-statement>
        <copyright-year>2026</copyright-year>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://moitvivt.ru/ru/journal/article?id=544"/>
      <abstract xml:lang="ru">
        <p>Актуальность совершенствования программно-алгоритмической защиты&#13;
аппаратных устройств, работающих в недоверенных средах (НС), обусловлена тем,&#13;
что они с наибольшей вероятностью подвержены воздействию с целью нарушения&#13;
функционирования их внутренней структуры. Цель статьи – анализ, оценка&#13;
эффективности, прогнозирование развития перспективных средств и методов атак на&#13;
информацию в НС. В статье приведен детальный анализ характеристик таких атак.&#13;
Уделено внимание алгоритмическим и аппаратным методам защиты информации от&#13;
атак по времени. Среди таких атак рассмотрены использующие кэш-память, анализ&#13;
энергопотребления и характеристик электромагнитных полей. Результаты и выводы&#13;
следующие. Показаны преимущества атак по времени перед другими методами атак&#13;
по побочным каналам: не требуется дорогостоящее лабораторное оборудование;&#13;
могут быть реализованы удаленно, без физического доступа к атакуемому средству&#13;
защиты информации; могут быть включены как часть комплексной атаки.&#13;
Недостатками атак по времени являются: необходимость высокой точности&#13;
определения времени выполнения операции шифрования; требование большого объема&#13;
данных для анализа; понимание всех особенностей реализации используемого&#13;
алгоритма, используемого при этом типа процессора, его архитектуры; наличие&#13;
доступа к кэш-памяти, которую использует исследуемый процесс. Недостатки&#13;
методов противодействия атакам по времени: они не являются комплексными; могут&#13;
создавать побочный канал утечки информации; отсутствуют оценки их&#13;
эффективности. Полученные результаты представляют ценность при практической&#13;
организации защиты информации в НС.</p>
      </abstract>
      <trans-abstract xml:lang="en">
        <p>The relevance of improving the software and algorithmic protection of hardware&#13;
devices operating in untrusted environments (UTE), due to the fact that they are most likely to&#13;
be exposed to the purpose of disruption of their internal structure. The purpose of the article&#13;
is to analyze, evaluate the effectiveness, and predict the development of promising tools and&#13;
methods of attacks on information in the UTE. The article discusses the main characteristics&#13;
of attacks on information in untrusted environments. A detailed analysis of these&#13;
characteristics is given. Attention is paid to algorithmic and hardware methods of information&#13;
protection from time attacks. Among these attacks are considered using cache memory,&#13;
analysis of power consumption and characteristics of electromagnetic fields. The advantages&#13;
of attacks over other methods of side-channel attacks are shown: no expensive laboratory&#13;
equipment is required; they can be implemented remotely, without physical access to the&#13;
attacked information security tool; can be included as part of a complex attack. The&#13;
disadvantages of time attacks are: the need for high accuracy of determining the time of the&#13;
encryption operation; the requirement of a large amount of data for analysis; understanding&#13;
of all the features of the implementation of the algorithm used in this type of processor, its&#13;
architecture; the availability of access to the cache memory used by the process under study.&#13;
Among the shortcomings of the methods of countering attacks over time are: they are not&#13;
complex; they can create a side channel of information leakage; there are no estimates of their&#13;
effectiveness. The results are valuable in the practical organization of information protection&#13;
in UTE.</p>
      </trans-abstract>
      <kwd-group xml:lang="ru">
        <kwd>защита информации</kwd>
        <kwd>недоверенная среда</kwd>
        <kwd>атака по времени</kwd>
        <kwd>анализ энергопотребления</kwd>
        <kwd>электромагнитное поле</kwd>
        <kwd>алгоритмические и аппаратные методы</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <kwd>information protection</kwd>
        <kwd>untrusted environment</kwd>
        <kwd>time attack</kwd>
        <kwd>energy consumption analysis</kwd>
        <kwd>electromagnetic field</kwd>
        <kwd>algorithmic and hardware methods</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Исследование выполнено без спонсорской поддержки.</funding-statement>
        <funding-statement xml:lang="en">The study was performed without external funding.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <title>References</title>
      <ref id="cit1">
        <label>1</label>
        <mixed-citation xml:lang="ru">Панасенко, С. П. Атаки на шифраторы, использующие утечки данных по&#13;
побочным каналам. Алгоритмы шифрования. Специальный&#13;
справочник. СПб.: БХВ-Петербург, 2009. – 576 с.</mixed-citation>
      </ref>
      <ref id="cit2">
        <label>2</label>
        <mixed-citation xml:lang="ru">Skorobogatov, S. P. Side-Channel Attacks: New Directions and Horizons //&#13;
Design and Security of Cryptographic Algorithms and Devices (ECRYPT II)&#13;
(3 June 2011). Albena. Bulgaria.</mixed-citation>
      </ref>
      <ref id="cit3">
        <label>3</label>
        <mixed-citation xml:lang="ru">Kocher, P. Timing Attacks on Implementations of Diffie-Hellmann, RSA,&#13;
DSS, and Other Systems // Advances in Cryptology — CRYPTO '96. Lecture&#13;
Notes in Computer Science. 1996. Vol. 1109. — Pp. 104 - 113.</mixed-citation>
      </ref>
      <ref id="cit4">
        <label>4</label>
        <mixed-citation xml:lang="ru">Poussier, R., Standaert, F., Grosso, V. Simple Key Enumeration (and Rank&#13;
Estimation) Using Histograms: An Integrated Approach // CHES. 2016. Pp.&#13;
61–81.</mixed-citation>
      </ref>
      <ref id="cit5">
        <label>5</label>
        <mixed-citation xml:lang="ru">Schindler, W., Lemke, K., Paar, C. A Stochastic Model for Differential Side&#13;
Channel Cryptanalysis // CHES. 2005. Pp. 30–46.</mixed-citation>
      </ref>
      <ref id="cit6">
        <label>6</label>
        <mixed-citation xml:lang="ru">Biham, E., Shamir, A. Differential cryptanalysis of DES-like cryptosystems //&#13;
CRYPTO'90 &amp; Journal of Cryptology. 1991. Vol. 4, Issue 1. – Pp. 3 - 72.</mixed-citation>
      </ref>
      <ref id="cit7">
        <label>7</label>
        <mixed-citation xml:lang="ru">Chari, S., Jutla, C., Rao, J., Rohatgi, P. Towards Sound Approaches to&#13;
Counteract Power-Analysis Attacks. Crypto'99. Springer-Verlag. – Pp. 398 –&#13;
411.</mixed-citation>
      </ref>
      <ref id="cit8">
        <label>8</label>
        <mixed-citation xml:lang="ru">Goubin, L., Patarin, J. DES and Differential Power Analysis. URL:&#13;
https://link.springer.com/content/pdf/10.1007%2F3-540-48059-5_15.pdf.</mixed-citation>
      </ref>
      <ref id="cit9">
        <label>9</label>
        <mixed-citation xml:lang="ru">Shivani, M., Padmini, C. Enhanced Delay-based Dual-rail Precharge Logic&#13;
against Leakage Power Analysis Attack // International Journal of Current&#13;
Engineering and Technology. 2015. Vol. 5, No. 4. – Pp. 2800-2803.</mixed-citation>
      </ref>
      <ref id="cit10">
        <label>10</label>
        <mixed-citation xml:lang="ru">Tiri, K., Verbauwhede, I. Charge Recycling Sense Amplifier Based Logic:&#13;
Securing Low Power Security IC’s against Differential Power Analysis. URL:&#13;
https://eprint.iacr.org/2004/067.pdf .</mixed-citation>
      </ref>
      <ref id="cit11">
        <label>11</label>
        <mixed-citation xml:lang="ru">Tiri, K., Hwang, D., Hodj, A., Lai Bo-Cheng, Yang, S., Schaumont, P.,&#13;
Verbauwhede, I. Prototype IC with WDDL and Differential Routing – DPA&#13;
ResistanceAssessment. URL: https://www.iacr.org/archive/ches2005/026.pdf&#13;
.</mixed-citation>
      </ref>
      <ref id="cit12">
        <label>12</label>
        <mixed-citation xml:lang="ru">Mizuno, H., Iwai, K., Tanaka, H., Kurokawa, T. A Correlation Power Analysis&#13;
Countermeasure for Enocoro-128 v2 Using Random Switching&#13;
Logic.URL:https://www.computer.org/csdl/proceedings/icnc/2012/4893/00/&#13;
4893 a326. pdf .</mixed-citation>
      </ref>
      <ref id="cit13">
        <label>13</label>
        <mixed-citation xml:lang="ru">Chen, Z., Zhou, Y. Dual-Rail Random Switching Logic: A Countermeasure to Reduce Side Channel Leakage. URL: http://www.sciweavers.org/read/dual-rail-random-switching-logic-acountermeasure-to-reduce-side-channel-leakage-187407&#13;
</mixed-citation>
      </ref>
      <ref id="cit14">
        <label>14</label>
        <mixed-citation xml:lang="ru">Dhem, J.-F., Koeune, F., Leroux, P.-A., Mestr, P., Quisquater, J.-J., Willems,&#13;
J.-L. A Practical Implementation of the Timing Attack. Technical Report&#13;
CG1998/1. Brussels: Universities catholique de Louvain, 1998. – 19 p.</mixed-citation>
      </ref>
      <ref id="cit15">
        <label>15</label>
        <mixed-citation xml:lang="ru">Schindler, W. Optimized timing attacks against public key cryptosystems //&#13;
Statistics &amp; Decisions. 2002. No 20 (2). – Pp.191-210.</mixed-citation>
      </ref>
      <ref id="cit16">
        <label>16</label>
        <mixed-citation xml:lang="ru">Schindler, W., Koeune, F., Quisquater, J.-J. Improving Divide and Conquer&#13;
Attacks against Cryptosystems by Better Error Detection/Correction&#13;
Strategies // Proc. of 8th IMA International Conference on Cryptography and&#13;
Coding. 2001. – Pp. 245 - 267.</mixed-citation>
      </ref>
      <ref id="cit17">
        <label>17</label>
        <mixed-citation xml:lang="ru">Schindler, W. A Timing Attack against RSA with the Chinese Remainder&#13;
Theorem. URL: https://tls.mbed.org/public/WSchindlerRSA_Timing_Attack.pdf</mixed-citation>
      </ref>
      <ref id="cit18">
        <label>18</label>
        <mixed-citation xml:lang="ru">Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G. AES&#13;
Power Attack Based on Induced Cache Miss and Countermeasure / IEEE&#13;
Computer Society, 2005. Information Technology: Coding and Computing,&#13;
International Conference. Apr. 4. 2005. Las Vegas, Nevada. – Pp. 586-591.</mixed-citation>
      </ref>
      <ref id="cit19">
        <label>19</label>
        <mixed-citation xml:lang="ru">Messerges, T. Using Second-Order Power Analysis to Attack DPA Resistant&#13;
Software. URL: https://link.springer.com/content/pdf/10.1007%2F3-540-&#13;
44499-8_19.pdf .</mixed-citation>
      </ref>
      <ref id="cit20">
        <label>20</label>
        <mixed-citation xml:lang="ru">Quisquater, J.-J., Samyde, D. Electromagnetic Analysis (EMA): Measures and&#13;
Countermeasures for Smart Cards. Smart Cards Programming and Security (eSmart 2001). Lectures Notes in Computer Science (LNCS). 2001. Vol. 2140.&#13;
Springer. – Pp. 200—210</mixed-citation>
      </ref>
      <ref id="cit21">
        <label>21</label>
        <mixed-citation xml:lang="ru">Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P. The EM Side&#13;
Channel(s): Attacks and Assessment Methodologies. In Cryptographic&#13;
Hardware and Embedded Systems // CHES 2002, LNCS 2523. SpringerVerlag. – Pp. 29–45.</mixed-citation>
      </ref>
      <ref id="cit22">
        <label>22</label>
        <mixed-citation xml:lang="ru">Quisquater, J.-J., Samyde, D. Automatic Code Recognition for Smart Cards&#13;
Using a Kohonen Neural Network. URL: https://www.usenix.org/legacy&#13;
/event/cardis02/full papers/quisquater/quisquater.pdf.</mixed-citation>
      </ref>
    </ref-list>
    <fn-group>
      <fn fn-type="conflict">
        <p>The authors declare that there are no conflicts of interest present.</p>
      </fn>
    </fn-group>
  </back>
</article>