Trace-Driven Cache Attacks on AES (Short Paper)

  • Onur Acıiçmez
  • Çetin Kaya Koç
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4307)

Abstract

Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present an efficient trace-driven cache attack on a widely used implementation of the AES cryptosystem. We also evaluate the cost of the proposed attack in detail under the assumption of a noiseless environment. We develop an accurate mathematical model that we use in the cost analysis of our attack. We use two different metrics, specifically, the expected number of necessary traces and the cost of the analysis phase, for the cost evaluation purposes. Each of these metrics represents the cost of a different phase of the attack.

Keywords

Side-channel Analysis cache attacks trace-driven attacks AES 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Acıiçmez, O., Schindler, W., Koç, Ç.K.: Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, Virginia, November 7-11, pp. 139–146 (2005)Google Scholar
  2. 2.
    Acıiçmez, O., Koç, Ç.K.: Trace-Driven Cache Attacks on AES. Cryptology ePrint Archive, Report 2006/138 (2006)Google Scholar
  3. 3.
    Acıiçmez, O., Schindler, W., Koç, Ç.K.: Cache Based Remote Timing Attack on the AES. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 271–286. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Bernstein, D.J.: Cache-timing attacks on AES (April 2005), available at: http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
  5. 5.
    Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES Power Attack Based on Induced Cache Miss and Countermeasure. In: International Symposium on Information Technology: Coding and Computing - ITCC 2005, Las Vegas, Nevada, USA, April 4-6, vol. 1 (2005)Google Scholar
  6. 6.
    Bonneau, J., Mironov, I.: Cache-Collision Timing Attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 201–215. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  7. 7.
    Brumley, D., Boneh, D.: Remote Timing Attacks are Practical. In: Proceedings of the 12th Usenix Security Symposium, pp. 1–14 (2003)Google Scholar
  8. 8.
    Cryptographic Key Length Recommendation. available at: http://www.keylength.com
  9. 9.
    Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)MATHGoogle Scholar
  10. 10.
    Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side Channel Cryptanalysis of Product Ciphers. Journal of Computer Security 8, 141–158 (2000)Google Scholar
  11. 11.
    Kocher, P.C.: Timing Attacks on Implementations of Diffie–Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)Google Scholar
  12. 12.
    Lauradoux, C.: Collision attacks on processors with cache and countermeasures. In: Wolf, C., Lucks, S., Yau, P.-W. (eds.) Western European Workshop on Research in Cryptology - WEWoRC 2005, pp. 76–85 (2005)Google Scholar
  13. 13.
    Neve, M., Seifert, J.-P., Wang, Z.: A refined look at Bernstein’s AES side-channel analysis. In: Proceedings of ACM Symposium on Information, Computer and Communications Security - ASIACCS 2006, Taipei, Taiwan, March 21-24 (2006)Google Scholar
  14. 14.
    Neve, M., Seifert, J.-P.: Advances on Access-driven Cache Attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 147–162. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  15. 15.
    Osvik, D.A., Shamir, A., Tromer, E.: Cache Attacks and Countermeasures: The Case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1–20. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Page, D.: Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel. Technical Report CSTR-02-003, Department of Computer Science, University of Bristol (June 2002)Google Scholar
  17. 17.
    Percival, C.: Cache missing for fun and profit. BSDCan 2005, Ottawa (2005), available at: http://www.daemonology.net/hyperthreading-considered-harmful/
  18. 18.
    Tsunoo, Y., Saito, T., Suzaki, T., Shigeri, M., Miyauchi, H.: Cryptanalysis of DES Implemented on Computers with Cache. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 62–76. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  19. 19.
    Tsunoo, Y., Tsujihara, E., Minematsu, K., Miyauchi, H.: Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In: ISITA 2002 (2002)Google Scholar
  20. 20.
    Tsunoo, Y., Tsujihara, E., Shigeri, M., Kubo, H., Minematsu, K.: Improving cache attacks by considering cipher structure. International Journal of Information Security (February 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Onur Acıiçmez
    • 1
  • Çetin Kaya Koç
    • 1
    • 2
  1. 1.School of EECSOregon State UniversityCorvallisUSA
  2. 2.Information Security Research CenterIstanbul Commerce UniversityIstanbulTurkey

Personalised recommendations