Analysis of countermeasures against access driven cache attacks on AES

被引:0
|
作者
Bloemer, Johannes [1 ]
Krummel, Volker [1 ]
机构
[1] Univ Gesamthsch Paderborn, Fac Comp Sci Elect Engn & Math, Paderborn, Germany
来源
SELECTED AREAS IN CRYPTOGRAPHY | 2007年 / 4876卷
关键词
cache attacks; AES; threat model; countermeasures; random permutations;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cache based attacks (CBA) exploit the different access times of main memory and cache memory to determine information about internal states of cryptographic algorithms. CBAs turn out to be very powerful attacks even in practice. In this paper we present a general and strong model to analyze the security against CBAs. We introduce the notions of information leakage and resistance to analyze the security of several implementations of AES. Furthermore, we analyze how to use random permutations to protect against CBAs. By providing a successful attack on an AES implementation protected by random permutations we show that random permutations used in a straightforward manner are not enough to protect against CBAs. Hence, to improve upon the security provided by random permutations, we describe the property a permutation must have in order to prevent the leakage of some key bits through CBAs.
引用
收藏
页码:96 / 109
页数:14
相关论文
共 50 条
  • [1] Cache attacks and countermeasures: The case of AES
    Osvik, DA
    Shamir, A
    Tromer, E
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 1 - 20
  • [2] Advances on access-driven cache attacks on AES
    Neve, Michael
    Seifert, Jean-Pierre
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4356 : 147 - +
  • [3] Efficient Cache Attacks on AES, and Countermeasures
    Eran Tromer
    Dag Arne Osvik
    Adi Shamir
    Journal of Cryptology, 2010, 23 : 37 - 71
  • [4] Efficient Cache Attacks on AES, and Countermeasures
    Tromer, Eran
    Osvik, Dag Arne
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2010, 23 (01) : 37 - 71
  • [5] Rigorous Analysis of Software Countermeasures against Cache Attacks
    Doychev, Goran
    Kopf, Boris
    ACM SIGPLAN NOTICES, 2017, 52 (06) : 406 - 421
  • [6] Research on access driven cache timing attacks against camellia
    Zhao X.-J.
    Wang T.
    Zheng Y.-Y.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (07): : 1153 - 1164
  • [7] Cache-collision timing attacks against AES
    Bonneau, Joseph
    Mironov, Ilya
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 201 - 215
  • [8] Cache Games - Bringing Access-Based Cache Attacks on AES to Practice
    Gullasch, David
    Bangerter, Endre
    Krenn, Stephan
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 490 - 505
  • [9] Cache based power analysis attacks on AES
    Fournier, Jacques
    Tunstall, Michael
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 17 - 28
  • [10] Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
    Gallais, Jean-Francois
    Kizhvatov, Ilya
    Tunstall, Michael
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 243 - +