An error-tolerant approach for efficient AES key retrieval in the presence of cacheprefetching - experiments, results, analysis

被引:1
作者
Ashokkumar, C. [1 ]
Venkatesh, M. Bhargav Sri [2 ]
Giri, Ravi Prakash [1 ]
Roy, Bholanath [1 ]
Menezes, Bernard [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Mumbai, Maharashtra, India
[2] Indian Inst Technol, Dept Elect Engn, Mumbai, Maharashtra, India
来源
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES | 2019年 / 44卷 / 04期
关键词
AES; access-driven; cache attacks; side channel; table look-up; CACHE ATTACKS;
D O I
10.1007/s12046-019-1070-8
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The challenge in cache-based attacks on cryptographic algorithms is not merely to capture the cache footprints during their execution but to process the obtained information to deduce the secret key. Our principal contribution is to develop a theoretical framework based upon which our AES key retrieval algorithms are not only more efficient in terms of execution time but also require up to 75% fewer blocks of ciphertext compared with previous work. Aggressive hardware prefetching greatly complicates access-driven attacks since they are unable to distinguish between a cache line fetched on demand versus one prefetched and not subsequently used during a run of a victim executing AES. We implement a multi-threaded spy code that reports accesses to the AES tables at the granularity level of a cache block. Since prefetching greatly increases side-channel noise, we develop sophisticated heuristics to "clean up'' the input received from the spy threads. Our key retrieval algorithms process the sanitized input to recover the AES key using only about 25 blocks of ciphertext in the presence of prefetching and, stunningly, a mere 2-3 blocks with prefetching disabled. We also derive analytical models that capture the effect of varying false positive and false negative rates on the number of blocks of ciphertext required for key retrieval.
引用
收藏
页数:18
相关论文
共 51 条
  • [1] Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
  • [2] Aciiçmez O, 2006, LECT NOTES COMPUT SC, V4307, P112
  • [3] Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
  • [4] [Anonymous], 2005, IACR Cryptol. EPrint Arch
  • [5] [Anonymous], 2016, DAC
  • [6] [Anonymous], 1991, P ACM IEEE C SUP SUP
  • [7] [Anonymous], 2012, 2012 ACM SIGSAC C CO, DOI DOI 10.1145/2382196.2382230
  • [8] [Anonymous], 1992, Journal of Computer Security
  • [9] Apacechea GI, 2014, IACR CRYPTOLOGY EPRI, P248
  • [10] Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks
    Ashokkumar, C.
    Giri, Ravi Prakash
    Menezes, Bernard
    [J]. 1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 261 - 275