Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks

被引:16
作者
Ashokkumar, C. [1 ]
Giri, Ravi Prakash [1 ]
Menezes, Bernard [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Bombay, Maharashtra, India
来源
1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY | 2016年
关键词
AES; access-driven; cache attacks; side channel; table lookup;
D O I
10.1109/EuroSP.2016.29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Leakage of information between two processes sharing the same processor cache has been exploited in many novel approaches targeting various cryptographic algorithms. The software implementation of AES is an especially attractive target since it makes extensive use of cache-resident table lookups. We consider two attack scenarios where either the plaintext or ciphertext is known. We employ a multi-threaded spy process and ensure that each time slice provided to the victim (running AES) is small enough so that it makes a very limited number of table accesses. We design and implement a suite of algorithms to deduce the 128-bit AES key using as input the set of (unordered) cache line numbers captured by the spy threads in an access-driven cache-based side channel attack. Our algorithms are expressed using simple relational algebraic operations and run in under a minute. Above all, our attack is highly efficient - we demonstrate recovery of the full AES key given only about 6-7 blocks of plaintext or ciphertext (theoretically even a single block would suffice). This is a substantial improvement over previous cache-based side channel attacks that require between 100 and a million encryptions. Moreover, our attack supports varying cache hit/miss observation granularities, does not need frequent interruptions of the victim and will work even if the victim makes up to 60 cache accesses before being interrupted. Finally, we develop analytic models to estimate the number of encryptions/decryptions required as a function of access granularity and compare model results with those obtained from our experiments.
引用
收藏
页码:261 / 275
页数:15
相关论文
共 38 条
  • [1] Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
  • [2] Aciiçmez O, 2006, LECT NOTES COMPUT SC, V4307, P112
  • [3] Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
  • [4] Akdemir Kahraman, 2010, White paper
  • [5] [Anonymous], 2012, Cross-VM Side Channels and Their Use to Extract Private Keys, Computer and communications security", p, DOI DOI 10.1145/2382196.2382230
  • [6] [Anonymous], 1997, Handbook of Applied Cryptography
  • [7] Apecechea G.I., 2014, IACR CRYPTOLOGY EPRI, V2014, P248
  • [8] An Approach for Isolating the Sources of Information Leakage Exploited in Cache-Based Side-Channel Attacks
    Atici, Ali Can
    Yilmaz, Cemal
    Savas, Erkay
    [J]. 2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 75 - 84
  • [9] BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
  • [10] Bonneau J, 2006, LECT NOTES COMPUT SC, V4249, P201