Abstract
In Chap. 4 we saw how an adversary can use the execution time of the Advanced Encryption Standard (AES) block cipher to obtain information about the secret key. The number of key bits that the adversary determines is however restricted by the size of the cache line. If a cache line holds \(2^\delta\) elements of a look-up table used in AES, then at least δ bits of the key are hidden from the adversary. In this chapter, we discuss how properties of the block cipher along with timing side channels can be used to determine more key bits. The chapter begins with a second round time-driven cache attack on AES and then dwells into differential cache attacks on Feistel ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aciiçmez O, Schindler W, Kaya Koç Ç (2007) Cache based remote timing attack on the AES. In: Abe M (ed) CT-RSA. Lecture notes in computer science, vol 4377. Springer, Berlin, pp 271–286
Aoki K, Ichikawa T, Kanda M, Matsui M, Moriai S, Nakajima J, Tokita T (2000) Camellia: a 128-bit block cipher suitable for multiple platforms—design and analysis. In: Stinson DR, Tavares SE (eds) Selected areas in cryptography. Lecture notes in computer science, vol 2012. Springer, Berlin, pp 39–56
Shirai T, Shibutani K, Akishita T, Moriai S, Iwata T (2007) The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov A (ed) FSE. Lecture notes in computer science, vol 4593. Springer, Berlin, pp 181–195
Diffie W, Liden G (trans) (2008) SMS4 encryption algorithm for wireless networks. Cryptology ePrint Archive, Report 2008/329 (http://eprint.iacr.org/)
Kanda M, Moriai S, Aoki K, Ueda H, Takashima Y, Ohta K, Matsumoto T (2000) E2—a new 128-bit block cipher. IEICE Trans Fundam Electron Commun Comput Sci E82(A-1):48–59
Fournier JJA, Tunstall M (2006) Cache based power analysis attacks on AES. In: Batten LM, Safavi-Naini R (eds) ACISP, ser. Lecture notes in computer science, vol 4058. Springer, pp 17–28
Gallais JF, Kizhvatov I,TunstallM(2010) Improved trace-driven cache-collision attacks against embedded AES implementations. In: Chung Y, Yung M (eds) WISA, ser. Lecture notes in computer science, vol 6513. pp 243–257
Rebeiro C, Poddar R, Datta A, Mukhopadhyay D (2011) An enhanced differential cache attack on CLEFIA for large cache lines. In the Proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, Chennai, India, pp 58–75, LNCS 7107
Poddar R, Datta A, Rebeiro C (2011) A cache trace attack on CAMELLIA. In the Proceedings of First International Conference on Security Aspects in Information Technology, InfoSecHiComNet 2011, Haldia, India, pp 141–156, LNCS 7011
Rebeiro C, Mukhopadhyay D (2011) Cryptanalysis of CLEFIA using differential methods with cache trace patterns. In the Proceedings of the Topics in Cryptology—CT-RSA 2011—The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, pp 89–103, LNCS
Rebeiro C, Nguyen PH, Mukhopadhyay D, PochmannA(2013) Formalizing the effect of feistel cipher structures on differential cache attacks. IEEE Trans Inf Foresics Secu 8(8):1274–1279
Nguyen PH, Rebeiro C, Mukhopadhyay D, Huaxiong W (2012) Improved differential cache trace attacks on SMS4. In the Proceedings of the 8th International Conference, Inscrypt 2012, Beijing, China, pp 29–45, LNCS 7763
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rebeiro, C., Mukhopadhyay, D., Bhattacharya, S. (2015). Advanced Time-Driven Cache Attacks on Block Ciphers. In: Timing Channels in Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-12370-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-12370-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-12369-1
Online ISBN: 978-3-319-12370-7
eBook Packages: EngineeringEngineering (R0)