Skip to main content

Advanced Time-Driven Cache Attacks on Block Ciphers

  • Chapter
  • First Online:
Timing Channels in Cryptography

Abstract

In Chap. 4 we saw how an adversary can use the execution time of the Advanced Encryption Standard (AES) block cipher to obtain information about the secret key. The number of key bits that the adversary determines is however restricted by the size of the cache line. If a cache line holds \(2^\delta\) elements of a look-up table used in AES, then at least δ bits of the key are hidden from the adversary. In this chapter, we discuss how properties of the block cipher along with timing side channels can be used to determine more key bits. The chapter begins with a second round time-driven cache attack on AES and then dwells into differential cache attacks on Feistel ciphers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aciiçmez O, Schindler W, Kaya Koç Ç (2007) Cache based remote timing attack on the AES. In: Abe M (ed) CT-RSA. Lecture notes in computer science, vol 4377. Springer, Berlin, pp 271–286

    Google Scholar 

  2. Aoki K, Ichikawa T, Kanda M, Matsui M, Moriai S, Nakajima J, Tokita T (2000) Camellia: a 128-bit block cipher suitable for multiple platforms—design and analysis. In: Stinson DR, Tavares SE (eds) Selected areas in cryptography. Lecture notes in computer science, vol 2012. Springer, Berlin, pp 39–56

    Google Scholar 

  3. Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov A (ed) FSE. Lecture notes in computer science, vol 4593. Springer, Berlin, pp 181–195

    Google Scholar 

  4. Diffie W, Liden G (trans) (2008) SMS4 encryption algorithm for wireless networks. Cryptology ePrint Archive, Report 2008/329 (http://eprint.iacr.org/)

  5. Kanda M, Moriai S, Aoki K, Ueda H, Takashima Y, Ohta K, Matsumoto T (2000) E2—a new 128-bit block cipher. IEICE Trans Fundam Electron Commun Comput Sci E82(A-1):48–59

    Google Scholar 

  6. Fournier JJA, Tunstall M (2006) Cache based power analysis attacks on AES. In: Batten LM, Safavi-Naini R (eds) ACISP, ser. Lecture notes in computer science, vol 4058. Springer, pp 17–28

    Google Scholar 

  7. Gallais JF, Kizhvatov I,TunstallM(2010) Improved trace-driven cache-collision attacks against embedded AES implementations. In: Chung Y, Yung M (eds) WISA, ser. Lecture notes in computer science, vol 6513. pp 243–257

    Google Scholar 

  8. Rebeiro C, Poddar R, Datta A, Mukhopadhyay D (2011) An enhanced differential cache attack on CLEFIA for large cache lines. In the Proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, Chennai, India, pp 58–75, LNCS 7107

    Google Scholar 

  9. Poddar R, Datta A, Rebeiro C (2011) A cache trace attack on CAMELLIA. In the Proceedings of First International Conference on Security Aspects in Information Technology, InfoSecHiComNet 2011, Haldia, India, pp 141–156, LNCS 7011

    Google Scholar 

  10. Rebeiro C, Mukhopadhyay D (2011) Cryptanalysis of CLEFIA using differential methods with cache trace patterns. In the Proceedings of the Topics in Cryptology—CT-RSA 2011—The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, pp 89–103, LNCS

    Google Scholar 

  11. Rebeiro C, Nguyen PH, Mukhopadhyay D, PochmannA(2013) Formalizing the effect of feistel cipher structures on differential cache attacks. IEEE Trans Inf Foresics Secu 8(8):1274–1279

    Google Scholar 

  12. Nguyen PH, Rebeiro C, Mukhopadhyay D, Huaxiong W (2012) Improved differential cache trace attacks on SMS4. In the Proceedings of the 8th International Conference, Inscrypt 2012, Beijing, China, pp 29–45, LNCS 7763

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chester Rebeiro .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (2015). Advanced Time-Driven Cache Attacks on Block Ciphers. In: Timing Channels in Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-12370-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12370-7_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12369-1

  • Online ISBN: 978-3-319-12370-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics