[Resource Topic] 2010/408: Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations

Welcome to the resource topic for 2010/408

Title:
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations

Authors: Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall

Abstract:

In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an improvement of an adaptive chosen plaintext attack presented at ACISP 2006. The second is a new known plaintext attack that can recover a 128-bit key with approximately 30 measurements to reduce the number of key hypotheses to 2^30. This is comparable to classical Dierential Power Analysis; however, our attacks are able to overcome certain masking techniques. We also show how to deal with unreliable cache event detection in the real-life measurement scenario and present practical explorations on a 32-bit ARM microprocessor.

ePrint: https://eprint.iacr.org/2010/408

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .