...
首页> 外文期刊>Computers & Security >A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES
【24h】

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES

机译:全面研究基于多个推论的代数跟踪驱动的AES缓存攻击

获取原文
获取原文并翻译 | 示例

摘要

Existing trace driven cache attacks (TDCAs) can only analyze the cache events in the first two rounds or the last round of AES, which limits the efficiency of the attacks. Recently, Zhao et al. proposed the multiple deductions-based algebraic side-channel attack (MDASCA) to cope with the errors in leakage measurements and to exploit new leakage models. Their preliminary results showed that MDASCA can improve TDCAs and attack the AES implemented with a compact lookup table of 256 bytes. This paper performs a comprehensive study of MDASCA-based TDCAs (MDATDCA) on most of the AES implementations that are widely used. First, the key recovery in TDCA is depicted by an abstract model regardless of the specific attack techniques. Then, the previous work of TDCAs on AES is classified into three types and its limitations are analyzed. How to utilize the cache events with MDATDCA is presented and the overhead is also calculated. To evaluate MDATDCA on AES, this paper constructs a mathematical model to estimate the maximal number of leakage rounds that can be utilized and the minimal number of cache traces required for a successful MDATDCA. Extensive experiments are conducted under different implementations, attack scenarios and key lengths of AES. The experimental results are consistent with the theoretical analysis. Many improvements are achieved. For the first time, we show that TDCAs on AES-192 and AES-256 become possible with the MDATDCA technique. Our work attests that combining TDCAs with algebraic techniques is a very efficient way to improve cache attacks.
机译:现有的跟踪驱动的缓存攻击(TDCA)只能分析AES的前两轮或最后一轮中的缓存事件,这限制了攻击的效率。最近,赵等人。提出了基于多重演绎的代数边通道攻击(MDASCA),以应对泄漏测量中的误差并开发新的泄漏模型。他们的初步结果表明,MDASCA可以改进TDCA,并使用256字节的紧凑查找表来攻击实现的AES。本文对广泛使用的大多数AES实现进行了基于MDASCA的TDCA(MDATDCA)的综合研究。首先,TDCA中的密钥恢复由抽象模型来描述,而与特定的攻击技术无关。然后,将TDCA在AES上的先前工作分为三种类型,并分析了其局限性。提出了如何在MDATDCA中使用缓存事件,并且还计算了开销。为了评估AES上的MDATDCA,本文构建了一个数学模型来估计可以利用的最大泄漏回合数和成功实现MDATDCA所需的最少缓存跟踪数。在不同的实现方式,攻击场景和AES密钥长度下进行了广泛的实验。实验结果与理论分析相吻合。实现了许多改进。我们首次展示了MDATDCA技术使AES-192和AES-256上的TDCA成为可能。我们的工作证明,将TDCA与代数技术相结合是改善缓存攻击的一种非常有效的方法。

著录项

  • 来源
    《Computers & Security 》 |2013年第ptab期| 173-189| 共17页
  • 作者单位

    Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China,The Institute of North Electronic Equipment, Beijing 100083, China;

    The Institute of North Electronic Equipment, Beijing 100083, China;

    Department of Computer Science and Engineering, University of Connecticut, Storrs 06269, USA;

    Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;

    Department of Computer Science and Engineering, University of Connecticut, Storrs 06269, USA;

    Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, L-1359 Luxembourg, Luxembourg;

    Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, L-1359 Luxembourg, Luxembourg;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Multiple deductions; Algebraic side-channel attack; Trace driven; Cache attack; Error-tolerant; AES-128/192/256;

    机译:多次扣除;代数旁道攻击;跟踪驱动;缓存攻击;容错AES-128 / 192/256;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号