Understanding cache attacks - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Rapport (Rapport De Recherche) Année : 2006

Understanding cache attacks

Anne Canteaut
Cédric Lauradoux
  • Fonction : Auteur
  • PersonId : 833548

Résumé

This paper points out that both the micro-architecture of the processor and the cache initial state impact the amount of side-channel information which is provided by analyzing the cache behaviour during a symmetric encryption. Therefore, the vulnerability of a block cipher implementation based on lookup tables highly varies with the encryption context and with the targeted platform. Our results then clarify some simulations reported by Bernstein and show that they can be reproduced only in a very particular context. However, we point out that some AES key bits can be recovered even if all lookup tables lie in the cache before each encryption, i.e., if all cache misses are avoided.

Domaines

Autre [cs.OH]
Fichier principal
Vignette du fichier
RR-5881.pdf (296.88 Ko) Télécharger le fichier
Loading...

Dates et versions

inria-00071387 , version 1 (23-05-2006)

Identifiants

  • HAL Id : inria-00071387 , version 1

Citer

Anne Canteaut, Cédric Lauradoux, André Seznec. Understanding cache attacks. [Research Report] RR-5881, INRIA. 2006. ⟨inria-00071387⟩
385 Consultations
544 Téléchargements

Partager

Gmail Facebook X LinkedIn More