2009
DOI: 10.1007/978-3-642-04159-4_13
|View full text |Cite
|
Sign up to set email alerts
|

A Cache Timing Analysis of HC-256

Abstract: Abstract. In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that can also be used for designing stream ciphers. From the observations made in our analysis, we derive a number of design principles for hardening ciphers against cache timing attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…This technique is known as Prime+Probe [18]. Cache timing attacks have been successfully mounted on several ciphers, notably the AES [4,18,26,14].…”
Section: Timelinementioning
confidence: 99%
See 4 more Smart Citations
“…This technique is known as Prime+Probe [18]. Cache timing attacks have been successfully mounted on several ciphers, notably the AES [4,18,26,14].…”
Section: Timelinementioning
confidence: 99%
“…An asynchronous cache adversary, on the other hand, is able to make cache measurements in parallel to the execution of the routine. She is able to obtain a list of all cache accesses made in chronological order [26]. Here, there are different viewpoints on the resources available to the adversary.…”
Section: Timelinementioning
confidence: 99%
See 3 more Smart Citations