Paper 2006/138

Trace-Driven Cache Attacks on AES

Onur Ac\i{}içmez and Çetin Kaya Koç

Abstract

Cache based side-channel attacks have recently been attracted significant attention due to the new developments in the field. In this paper, we present efficient trace-driven cache attacks on a widely used implementation of the AES cryptosystem. We also evaluate the cost of the proposed attacks in detail under the assumption of a noiseless environment. We develop an accurate mathematical model that we use in the cost analysis of our attacks. We use two different metrics, specifically, the expected number of necessary traces and the cost of the analysis phase, for the cost evaluation purposes. Each of these metrics represents the cost of a different phase of the attack.

Note: We have improved the previously presented attack and also developed a new attack variant, which is much more efficient than the previous attack.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. A short version was presented at ICICS'06
Keywords
cache attacktrace drivenside-channel cryptanalysisAES
Contact author(s)
aciicmez @ eecs oregonstate edu
History
2006-12-05: last of 3 revisions
2006-04-09: received
See all versions
Short URL
https://ia.cr/2006/138
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/138,
      author = {Onur Ac\i{}içmez and Çetin Kaya Koç},
      title = {Trace-Driven Cache Attacks on AES},
      howpublished = {Cryptology ePrint Archive, Paper 2006/138},
      year = {2006},
      note = {\url{https://eprint.iacr.org/2006/138}},
      url = {https://eprint.iacr.org/2006/138}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.