Selected Areas in Cryptography
DOI: 10.1007/978-3-540-77360-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Countermeasures Against Access Driven Cache Attacks on AES

Abstract: Abstract. Cache based attacks (CBA) exploit the different access times of main memory and cache memory to determine information about internal states of cryptographic algorithms. CBAs turn out to be very powerful attacks even in practice. In this paper we present a general and strong model to analyze the security against CBAs. We introduce the notions of information leakage and resistance to analyze the security of several implementations of AES. Furthermore, we analyze how to use random permutations to protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…It obfuscates attackers' observation on cache access activities. However fixed permutation can still leak information, as demonstrated in [5] for AES. Although the security offered by random permutation can be increased by frequently updating the permutation, the updating frequency remains an open question for pure software approaches due to the tradeoff between performance and security.…”
Section: (2) Random Permutation Against Access-driven Attacksmentioning
confidence: 96%
See 2 more Smart Citations
“…It obfuscates attackers' observation on cache access activities. However fixed permutation can still leak information, as demonstrated in [5] for AES. Although the security offered by random permutation can be increased by frequently updating the permutation, the updating frequency remains an open question for pure software approaches due to the tradeoff between performance and security.…”
Section: (2) Random Permutation Against Access-driven Attacksmentioning
confidence: 96%
“…There are also other similar approaches, which use smaller numbers of lookup tables [16]. However, at the cost of substantial performance overhead, these approaches only increase the number of samples required for access-driven and time-driven attacks [5], [22].…”
Section: (3) Small Tables Against Access/time-driven Attacksmentioning
confidence: 96%
See 1 more Smart Citation
“…We can also run it backwards to retrieve the key (the state update function and the key/IV setup are invertible). This shows that an attack is even possible for a synchronous cache adversary (not only for an asynchronous adversary, as suspected by Bernstein [2]) 4 .…”
Section: Cost Of the Attackmentioning
confidence: 83%
“…Subsequent research verified the correctness of the findings [11,10,9,15], improved the attack technically [14,3,8] or algorithmically [5], and devised and analysed countermeasures [6,4,16].…”
Section: Introductionmentioning
confidence: 95%