Cache based power analysis attacks on AES

15Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper describes possible attacks against software implementations of AES running on processors with cache mechanisms, particularly in the case of smart cards. These attacks are based on side-channel information gained by observing cache hits and misses in the current drawn by the smart card. Two different attacks are described. The first is a combination of ideas proposed in [2] and [11] to produce an attack that only requires the manipulation of the plain text and the observation of the current. The second is an attack based on specific implementations of the xtime function [10]. These attacks are shown to also work against algorithms using Boolean data masking techniques as a DPA countermeasure. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Fournier, J., & Tunstall, M. (2006). Cache based power analysis attacks on AES. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4058 LNCS, pp. 17–28). Springer Verlag. https://doi.org/10.1007/11780656_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free