An enhanced differential cache attack on CLEFIA for large cache lines

13Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Reported results on cache trace attacks on CLEFIA do not work with increased cache line size. In this paper we present an enhanced cache trace attack on CLEFIA using the differential property of the s-boxes of the cipher and the diffusion properties of the linear transformations of the underlying Feistel structures. The attack requires 3 round keys, which are obtained by monitoring cache access patterns of 4 rounds of the cipher. A theoretical analysis is made on the complexity of the attack, while experimental results are presented to show the effectiveness of power and timing side-channels in deducing cache access patterns. The efficacy of the attack is theoretically justified by showing the effect of cache line size on the time and space complexity of the attack. Finally countermeasures that guarantee security against cache-attacks are compared for their efficiency on large cache lines. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Rebeiro, C., Poddar, R., Datta, A., & Mukhopadhyay, D. (2011). An enhanced differential cache attack on CLEFIA for large cache lines. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7107 LNCS, pp. 58–75). https://doi.org/10.1007/978-3-642-25578-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free