Analysis of Countermeasures Against Access Driven Cache Attacks on AES

  • Johannes Blömer
  • Volker Krummel
Conference paper

DOI: 10.1007/978-3-540-77360-3_7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4876)
Cite this paper as:
Blömer J., Krummel V. (2007) Analysis of Countermeasures Against Access Driven Cache Attacks on AES. In: Adams C., Miri A., Wiener M. (eds) Selected Areas in Cryptography. SAC 2007. Lecture Notes in Computer Science, vol 4876. Springer, Berlin, Heidelberg

Abstract

Cache based attacks (CBA) exploit the different access times of main memory and cache memory to determine information about internal states of cryptographic algorithms. CBAs turn out to be very powerful attacks even in practice. In this paper we present a general and strong model to analyze the security against CBAs. We introduce the notions of information leakage and resistance to analyze the security of several implementations of AES. Furthermore, we analyze how to use random permutations to protect against CBAs. By providing a successful attack on an AES implementation protected by random permutations we show that random permutations used in a straightforward manner are not enough to protect against CBAs. Hence, to improve upon the security provided by random permutations, we describe the property a permutation must have in order to prevent the leakage of some key bits through CBAs.

Keywords

cache attacks AES threat model countermeasures random permutations 

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Johannes Blömer
    • 1
  • Volker Krummel
    • 1
  1. 1.Faculty of Computer Science, Electrical Engineering and Mathematics, University of PaderbornGermany

Personalised recommendations