Cache Based Power Analysis Attacks on AES - Mines Saint-Étienne Accéder directement au contenu
Communication Dans Un Congrès Année : 2006

Cache Based Power Analysis Attacks on AES

Jacques Jean-Alain Fournier
  • Fonction : Auteur
  • PersonId : 871749
Michael Tunstall
  • Fonction : Auteur
  • PersonId : 871752

Résumé

This paper describes possible attacks against software implementations of AES running on processors with cache mechanisms, particularly in the case of smart cards. These attacks are based on sidechannel information gained by observing cache hits and misses in the current drawn by the smart card. Two dierent attacks are described. The first is a combination of ideas proposed in [2] and [11] to produce an attack that only requires the manipulation of the plain text and the observation of the current. The second is an attack based on specific implementations of the xtime function [10]. These attacks are shown to also work against algorithms using Boolean data masking techniques as a DPA countermeasure.

Mots clés

Fichier principal
Vignette du fichier
CacheSPAonAES.pdf (134.64 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

emse-00489012 , version 1 (03-06-2010)

Identifiants

  • HAL Id : emse-00489012 , version 1

Citer

Jacques Jean-Alain Fournier, Michael Tunstall. Cache Based Power Analysis Attacks on AES. 11th Australasian Conference on Information Security and Privacy (ACISP'06), Jul 2006, Melbourne, Australia. pp.17-28. ⟨emse-00489012⟩

Collections

EMSE
123 Consultations
309 Téléchargements

Partager

Gmail Facebook X LinkedIn More