Understanding cache attacks - Inria - Institut national de recherche en sciences et technologies du numérique Access content directly
Reports (Research Report) Year : 2006

Understanding cache attacks

Anne Canteaut
Cédric Lauradoux
  • Function : Author
  • PersonId : 833548

Abstract

This paper points out that both the micro-architecture of the processor and the cache initial state impact the amount of side-channel information which is provided by analyzing the cache behaviour during a symmetric encryption. Therefore, the vulnerability of a block cipher implementation based on lookup tables highly varies with the encryption context and with the targeted platform. Our results then clarify some simulations reported by Bernstein and show that they can be reproduced only in a very particular context. However, we point out that some AES key bits can be recovered even if all lookup tables lie in the cache before each encryption, i.e., if all cache misses are avoided.

Domains

Other [cs.OH]
Fichier principal
Vignette du fichier
RR-5881.pdf (296.88 Ko) Télécharger le fichier
Loading...

Dates and versions

inria-00071387 , version 1 (23-05-2006)

Identifiers

  • HAL Id : inria-00071387 , version 1

Cite

Anne Canteaut, Cédric Lauradoux, André Seznec. Understanding cache attacks. [Research Report] RR-5881, INRIA. 2006. ⟨inria-00071387⟩
385 View
544 Download

Share

Gmail Facebook X LinkedIn More