期刊文献+

基于Cache的AES攻击:研究进展 被引量:3

Cache-Based Attacks against AES: Research Progress
原文传递
导出
摘要 旁路攻击技术是对密码安全的严重威胁,其作用过程在于利用了密码软硬件实现上的特性而降低了密码分析的复杂性。AES作为目前与未来加密的主要标准,其安全性具有特殊重要的意义。然而,近期的研究表明,主流计算平台上的AES加密程序,很可能会遭受基于Cache所泄漏的运行信息而导致的攻击。本文依据相关的研究,介绍了基于Cache的AES攻击的原理,描述了其现状与发展,分析了这种攻击的现实可行性,并且,说明了反制攻击的措施建议。 Side-channel attacks bring forth serious threat to cryptography security; it reduces the complexity of cryptanalysis by utilizing some characteristics in hardware/software implementation of the cipher. Being the main encryption standard for the present time and the future, the security of AES is of a special importance However, recent researches have revealed that, AES cipher program on mainstream computing platforms may suffer from one kind of attack resulted from the leaked running information through Cache. According to related research, this paper proposes the basic processes of such attack, describes its current status and progresses, analyzes its feasibility in real world, and explains the countermeasures and suggestions.
出处 《信息安全与通信保密》 2007年第8期41-43,共3页 Information Security and Communications Privacy
基金 国家高技术研究发展计划(863计划)资助(课题号:2006AA01Z446)。
关键词 攻击 AES CACHE attack AES cache
  • 相关文献

参考文献15

  • 1[1]Joan Daemen,Vincent Rijmen.The Design of Rijndael:AES-The Advanced Encryption Standard[M].Springer,2002.
  • 2[2]Bernstein D J.Cache-timing Attacks on AES[DB/OL].2005.http://cr.yp.to/antiforgery/cachetiming-20050414.pdf.
  • 3[3]Kocher C P.Timing Attacks on Implementations of Daffie-Hellman,RSA,DSS,and Other Systems[C].Cryptology 96.(LNCS 1109).Berlin:Springer-Verlag,1996.
  • 4[4]Page D.Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel.Technical Report CSTR-02-003.Department of Computer Science,University of Bristol,2002.
  • 5[5]Tsunoo Y,Saito T,Suzaki T,et al.Miyauchi.Cryptanalysis of DES Implemented on Computers with Cache[C].In:C.D.Walter,et al(Ed.).Cryptographic Hardware and Embedded Systems-CHES 2003.Springer LNCS-2779,Germany,2003,62~76.
  • 6[6]Osvik D A,Shamir A,Tromer E.Cache Attacks and Countermeasures:The Case of AES[C].In:D.Pointcheval (Ed.).The Cryptographers' Track at the RSA Conference 2006.Springer LNCS-3860,USA,2006.
  • 7[7]Neve M,Seifert J P.Advances on Access-driven Cache Attacks on AES[C].In:Selected Areas of Cryptography-SAC' 06.Springer,Canada,2006.
  • 8[8]Percival C.Cache Missing for Fun and Profit[C].In:Technical BSD Conference,Ottawa,2005.
  • 9[9]Lauradoux C.Collision Attacks on Processors with Cache and Countermeasures[C].In:C.Wolf,et al (Ed.).Western European Workshop on Research in Cryptology-WEEoRC 2005.Belgium,2005,76-85.
  • 10[10]Onur Aclicmezl,Werner Schindler,Cetin K.Koc.Cache Based Remote Timing Attack on the AES[C].In:M.Abe (Ed.).CT-RSA 2007.Springer LNCS-4377,USA,2007,271~286.

同被引文献5

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部