2013
DOI: 10.1016/j.cose.2013.07.002
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES

Abstract: First, the key recovery in TDCA is depicted by an abstract model regardless of the specific attack techniques.Then, the previous work of TDCAs on AES is classified into three types and its limitations are analyzed.How to utilize the cache events with MDATDCA is presented and the overhead is also calculated. To evaluate MDATDCA on AES, this paper constructs a mathematical model to estimate the maximal number of leakage rounds that can be utilized and the minimal number of cache traces required for a successful … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
(100 reference statements)
0
3
0
Order By: Relevance
“…At the end of two rounds, it can be seen that all byte differences becomes active, on which no further analysis is possible. Suppose, the 4 th round output has passive byte difference in any of the following byte positions: (1,8,11,14), (2,5,12,15), (3,6,9,16), or (4,7,10,13). Such a differential when decrypted two rounds will have 4 passive bytes differentials.…”
Section: Four Round Impossible Differentialmentioning
confidence: 99%
See 1 more Smart Citation
“…At the end of two rounds, it can be seen that all byte differences becomes active, on which no further analysis is possible. Suppose, the 4 th round output has passive byte difference in any of the following byte positions: (1,8,11,14), (2,5,12,15), (3,6,9,16), or (4,7,10,13). Such a differential when decrypted two rounds will have 4 passive bytes differentials.…”
Section: Four Round Impossible Differentialmentioning
confidence: 99%
“…An improved version of this attack is proposed in [10]. Cache attacks and collision attacks are illustrated in [11] and [12] respectively. Enhancement of AES security against modern attacks using variable key block ciphers are is given in [13].…”
Section: Introductionmentioning
confidence: 99%
“…Biased keys are able to reveal the pseudorandomness of the approach and the key is deduced further by applying differential methods or fault injection as shown before. Multiple deductions-based algebraic trace driven cache attack on AES has been shown in [22]. The behaviour of the cache reveals the input whole or partially.…”
Section: Related Workmentioning
confidence: 99%