2003
DOI: 10.1007/978-3-540-45238-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of DES Implemented on Computers with Cache

Abstract: Abstract. This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay as proposed in [11]. This cryptanalysis technique uses side-channel information on encryption processing to select and collect effective plaintexts for cryptanalysis, and infers the information on the expanded key from the collected plaintexts. On applying this attack, we found that the cipher can be broken with 2 23 known… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
148
0
1

Year Published

2005
2005
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 198 publications
(149 citation statements)
references
References 5 publications
0
148
0
1
Order By: Relevance
“…A Pseudorandom Number Generators (PRNG) are well-known techniques with broad applications in such areas as cryptography (Tusnoo et al, 2003;Ozturk et al, 2004;Panneton et al, 2006), simulation of stochastic processes (Entacher, 1998), comprehensive testing of technical systems (Leeb and Wegenkittl, 1997;Park and Miller, 1998), medical (Menyaev and Zharov, 2006a;2006b;Menyaev and Zharova, 2006;2013;2016;Sarimollaoglu et al, 2014;Cai et al, 2016a;2016b) and biological research (Wiese et al, 2005;Leonard and Jackson, 2015;Juratly et al, 2015;2016) and others (Rababbah 2004;2007;Politano et al, 2014;2016;Riguzzi, 2016). In these publications, the concept of uniform random numbers in PRNG actively uses the operations of bit logic.…”
Section: Related Workmentioning
confidence: 99%
“…A Pseudorandom Number Generators (PRNG) are well-known techniques with broad applications in such areas as cryptography (Tusnoo et al, 2003;Ozturk et al, 2004;Panneton et al, 2006), simulation of stochastic processes (Entacher, 1998), comprehensive testing of technical systems (Leeb and Wegenkittl, 1997;Park and Miller, 1998), medical (Menyaev and Zharov, 2006a;2006b;Menyaev and Zharova, 2006;2013;2016;Sarimollaoglu et al, 2014;Cai et al, 2016a;2016b) and biological research (Wiese et al, 2005;Leonard and Jackson, 2015;Juratly et al, 2015;2016) and others (Rababbah 2004;2007;Politano et al, 2014;2016;Riguzzi, 2016). In these publications, the concept of uniform random numbers in PRNG actively uses the operations of bit logic.…”
Section: Related Workmentioning
confidence: 99%
“…we have a cache with a granularity of 16 bytes) we can only be sure of the high nibble of the approximation given. Therefore ( 16 with at most sixteen different messages i.e. all sixteen possible values for the high nibble of p 2 can be tried until a cache hit is observed.…”
Section: The Power Consumptionmentioning
confidence: 99%
“…In all the equations used to test key hypotheses, the values generated are always compared with the neighbouring byte. If, for example, all bytes in the algorithm are masked with the random R the first phase of the attack described in section 4 will give (k 1 ⊕R⊕k 2 ⊕R)∧F0 16 . The R's will cancel leaving (k 1 ⊕ k 2 ) ∧ F0 16 as with the approach detailed in section 4.…”
Section: Implementing the Attackmentioning
confidence: 99%
See 2 more Smart Citations