2011
DOI: 10.1007/978-3-642-17955-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations

Abstract: Abstract. In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an improvement of an adaptive chosen plaintext attack presented at ACISP 2006. The second is a new known plaintext attack that can recover a 128-bit key with approximately 30 measurements to reduce the number of key hypotheses to 2 30 . This is comparable to classical Differential Power Analysis; however, our attacks are able to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
32
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 32 publications
(32 citation statements)
references
References 16 publications
0
32
0
Order By: Relevance
“…Cache attacks demonstrated fall into three categories, depending on the channels used to collect the leakages. These channels are spy processes [1], timing information [2,3] and power/electromagnetic (EM) traces [4,5,6,7,8,9,10,11]. The focus of this paper is trace driven cache attack (TDCA), which exploits the power or electromagnetic traces.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Cache attacks demonstrated fall into three categories, depending on the channels used to collect the leakages. These channels are spy processes [1], timing information [2,3] and power/electromagnetic (EM) traces [4,5,6,7,8,9,10,11]. The focus of this paper is trace driven cache attack (TDCA), which exploits the power or electromagnetic traces.…”
Section: Introductionmentioning
confidence: 99%
“…The number of traces required in TDCAs is much less than in the conventional differential power attacks (DPAs) [12], correlation power attacks (CPAs) [13] or other types of cache attacks [1,2,3]. Considering AES for example, only 30 cache traces are required in TDCAs [9,10] instead of hundreds (or thousands) of power traces in DPAs, CPAs [13], hundreds of cache traces in access driven cache attacks [1], and millions of cache traces in timing driven cache attacks [2,3].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations