• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Suiyu, Han Jun, Lu Shiting, and Zeng Xiaoyang. Cache Based AES Attack Implementation and Its Theoretical Analysis[J]. Journal of Computer Research and Development, 2011, 48(6): 955-963.
Citation: Zhang Suiyu, Han Jun, Lu Shiting, and Zeng Xiaoyang. Cache Based AES Attack Implementation and Its Theoretical Analysis[J]. Journal of Computer Research and Development, 2011, 48(6): 955-963.

Cache Based AES Attack Implementation and Its Theoretical Analysis

More Information
  • Published Date: June 14, 2011
  • This paper proposes a highly efficient cache-based timing attack method against AES as well as other cryptographic algorithms running on SoC platforms. It is available due to the leaking information of cache behavior which can be actually observed during AES execution and is implemented based on table lookups for performance enhancement. We can completely confirm the 128 b cipher key by searching the statistical relationship between the cipher key and encryption timing during the first two rounds. Compared with the known means, our method is much easier to carry out and more robust under noisy environments caused by hardware and software interference. Additionally, by introducing the notion of sample number needed for a successful attack which denotes the strength of cryptographic algorithm, we present an analytical model based on statistical differential timing analysis. Through this model we could find out that different attacking strategies as well as system noise and some other factors exert very different influence on necessary sample number. Using our method, we have successfully compromised AES on several SoC platforms and verified the analytical model on MIPS4kc SoC platform with Linux2.4. By studying this analytical model, some common features of cache-based timing attacks have been deduced, and countermeasures are proposed therefore.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (907) PDF downloads (367) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return