Cache Based Remote Timing Attack on the AES

13 years 11 months ago
Cache Based Remote Timing Attack on the AES
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems if the server under attack runs on a multitasking or simultaneous multithreading system with a large enough workload. This is an important difference to recent cache-based timing attacks as these attacks either did not provide any supporting experimental results indicating if they can be applied remotely, or they are not realistically remote attacks.
Onur Aciiçmez, Werner Schindler, Çet
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Authors Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
Comments (0)