@inproceedings{f5fe00df5d6c4046942f825679e2852b,
title = "Cache-collision timing attacks against AES",
abstract = "This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption. The attacks presented should be applicable to most high-speed software AES implementations and computing platforms, we have implemented them against OpenSSL v. 0.9.8.(a) running on Pentium III, Pentium IV Xeon, and UltraSPARC III+ machines. The most powerful attack has been shown under optimal conditions to reliably recover a full 128-bit AES key with 213 timing samples, an improvement of almost four orders of magnitude over the best previously published attacks of this type [Ber05]. While the task of defending AES against all timing attacks is challenging, a small patch can significantly reduce the vulnerability to these specific attacks with no performance penalty.",
keywords = "AES, Cache, Cryptanalysis, Side-channel attack, Timing attack",
author = "Joseph Bonneau and Ilya Mironov",
note = "Funding Information: ACKNOWLEDGMENTS We thank Katie McFadden, Danielle DiIullo, Lindsay Glass, and Ethan Tate for help with fish collection and laboratory observations. Comments from the Fisheries Ecology and Aquatic Sciences Lab Group at North Carolina State University, Nick Haddad, and Joseph Kawatski improved earlier versions of this manuscript. This project was funded by a State Wildlife Grant through the North Carolina Wildlife Resources Commission. Any use of trade, product, or firm names is for descriptive purposes only and does not imply endorsement by the U.S. Government. The North Carolina Cooperative Fish and Wildlife Research Unit is jointly supported by North Carolina State University, North Carolina Wildlife Resources Commission, U.S. Geological Survey, U.S. Fish and Wildlife Service, and Wildlife Management Institute.; 8th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2006 ; Conference date: 10-10-2006 Through 13-10-2006",
year = "2006",
doi = "10.1007/11894063_16",
language = "English (US)",
isbn = "3540465596",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "201--215",
booktitle = "Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings",
}