Cryptanalysis of CLEFIA using differential methods with cache trace patterns

18Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we use a combination of differential techniques and cache traces to attack the block cipher CLEFIA in less than 214 encryptions on an embedded processor with a cache line size of 32 bytes. The attack is evaluated on an implementation of CLEFIA on the PowerPC processor present in the SASEBO side channel attack evaluation board. The paper shows that although obtaining cache access patterns from the power consumption of the device may be difficult due to the non-blocking cache architectures of modern processors, still the cache trace has a distinct signature on the power profiles. Experimental results have been presented to show that the power consumption of the device reveal the cache access patterns, which are then used to obtain the CLEFIA key. Further, a simple low overhead countermeasure is implemented that is guaranteed to prevent cache attacks. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Rebeiro, C., & Mukhopadhyay, D. (2011). Cryptanalysis of CLEFIA using differential methods with cache trace patterns. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6558 LNCS, pp. 89–103). https://doi.org/10.1007/978-3-642-19074-2_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free