Cache timing attacks on Clefia

24Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper discusses the performance of cache timing attacks on Clefia, which is based on the generalized Feistel structure and implemented using small tables. We mention the difficulties on mounting a timing based cache attack on the cipher, and then explain why a cache attack is still possible. To the best of our knowledge, no reported work on cache attacks target ciphers which are implemented with small tables. Our attack uses the fact that parallelization and pipelining of memory accesses can only be done within a single round of a cipher, but not across rounds. Our findings show that 121 bits of the 128 bit key can be revealed in 226.64 Clefia encryptions on an Intel Core 2 Duo machine. © 2009 Springer-Verlag.

Cite

CITATION STYLE

APA

Rebeiro, C., Mukhopadhyay, D., Takahashi, J., & Fukunaga, T. (2009). Cache timing attacks on Clefia. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5922 LNCS, pp. 104–118). https://doi.org/10.1007/978-3-642-10628-6_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free