Sciweavers

Share
WISA
2010
Springer

Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations

10 years 2 months ago
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations
In this paper we present two attacks that exploit cache events, which are visible in some side channel, to derive a secret key used in an implementation of AES. The first is an improvement of an adaptive chosen plaintext attack presented at ACISP 2006. The second is a new known plaintext attack that can recover a 128-bit key with approximately 30 measurements to reduce the number of key hypotheses to 230 . This is comparable to classical Differential Power Analysis; however, our attacks are able to overcome certain masking techniques. We also show how to deal with unreliable cache event detection in the real-life measurement scenario and present practical explorations on a 32-bit ARM microprocessor.
Jean-François Gallais, Ilya Kizhvatov, Mich
Added 15 Feb 2011
Updated 15 Feb 2011
Type Journal
Year 2010
Where WISA
Authors Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall
Comments (0)
books