A Cache Timing Analysis of HC-256

  • Erik Zenner
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5381)


In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that can also be used for designing stream ciphers. From the observations made in our analysis, we derive a number of design principles for hardening ciphers against cache timing attacks.


Cryptanalysis side-channel attack cache timing attack  stream cipher HC-256 


  1. 1.
    Bernstein, D.: Cache timing attacks on AES (2005),
  2. 2.
    Bernstein, D.: Leaks (February 2007),
  3. 3.
    Bertoni, G., Zaccaria, V., Breveglieri, L., Monchiero, M., Palermo, G.: AES power attack based on induced cache miss and countermeasure. In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), vol. 1, pp. 586–591. IEEE Computer Society, Los Alamitos (2005)Google Scholar
  4. 4.
    Blömer, J., Krummel, V.: Analysis of countermeasures against access driven cache attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 96–109. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Bonneau, J., Mironov, I.: Cache-collision timing attacks against AES. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 201–215. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Brickell, E., Graunke, G., Neve, M., Seifert, S.: Software mitigations to hedge AES against cache-based software side-channel vulnerabilities (2006),
  7. 7.
  8. 8.
    Neve, M., Seifert, J.-P.: Advances on access-driven cache attacks on AES. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 147–162. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Neve, M., Seifert, J., Wang, Z.: Cache time-behavior analysis on AES (2006),
  10. 10.
    Neve, M., Seifert, J., Wang, Z.: A refined look at bernstein’s AES side-channel analysis. In: Proc. AsiaCSS 2006, p. 369. ACM, New York (2006)Google Scholar
  11. 11.
    O’Hanlon, M., Tonge, A.: Investigation of cache-timing attacks on AES (2005),
  12. 12.
    Osvik, D., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES (2005),
  13. 13.
    Osvik, D.A., Shamir, A., Tromer, E.: Cache attacks and countermeasures: The case of AES. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 1–20. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Percival, C.: Cache missing for fun and profit. Paper accompanying a talk at BSDCan 2005 (2005),
  15. 15.
    Salembier, R.: Analysis of cache timing attacks against AES. Scholarly Paper, ECE Department, George Mason University, Virginia (May 2006),
  16. 16.
    Wang, Z., Lee, R.: New cache designs for thwarting software cache-based side channel attacks. In: Proc. ISCA 2007, pp. 494–505. ACM, New York (2007)Google Scholar
  17. 17.
    Wu, H.: A new stream cipher HC-256. In: Roy, B., Meier, W. (eds.) FSE 2004, vol. 3017, pp. 226–244. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Erik Zenner
    • 1
  1. 1.Department of MathematicsTechnical University of DenmarkDenmark

Personalised recommendations