期刊文献+

针对AES加密算法的时序驱动Cache攻击研究

Research on timing driven cache attack against AES encryption algorithm
下载PDF
导出
摘要 时序驱动Cache攻击是指通过分析处理器中加密算法的不同执行时间来恢复密钥,从而实现对密码系统的攻击。文章针对AES加密算法进行时序驱动Cache攻击分析:首先介绍了Cache结构和信息泄露原理,指明对算法执行过程中泄露信息的利用,描述了AES算法,对基于碰撞的时序驱动Cache攻击和基于模板的时序驱动Cache攻击进行针对AES算法的攻击分析。需要特别指出的是,AES查表操作的实现方式是主流计算机硬件系统的固有特性,目前对这类攻击难以规避,且攻击可以应用于大多数的AES实现软件。 The purpose of cache-timing attacks is to recover the key by analyzing the different execution times of the encryption algorithm in the processor,so as to realize the attack on the cryptographic system.This paper analyzes cache-timing attacks on AES encryption algorithm.Firstly,the structure of cache and the principle of information leakage are introduced.At the same time,the utilization of leaked information in the process of algorithm execution is pointed out.Then the AES algorithm is described.Finally,cache-timing attacks based on collision and template are analyzed.It should be pointed out that the implementation of AES table lookup operation is an inherent characteristic of mainstream computer hardware system.It is difficult to evade this kind of attack at present.At the same time,this kind of attack can be applied to most AES implementation software.
作者 李志峰 高玉琢 Li Zhifeng;Gao Yuzhuo(College of Information Engineering,Ningxia University,Ningxia 750000,China)
出处 《无线互联科技》 2021年第14期44-47,共4页 Wireless Internet Technology
关键词 AES 侧信道攻击 碰撞攻击 模板攻击 AES side channel attacks collision attack template attack
  • 相关文献

参考文献2

二级参考文献12

  • 1Dag Arne Osvik, Adi Shamir, Eran Tromer. Cache attacks and countermeasures: the case of aes[A]. David Pointcheval, editor, CTRSA, Lecture Notes in Computer Science [M]. Springer, 2006,3860 :1-20.
  • 2Colin Percival. Cache missing for fun and profit [C]. BSD-Can2005,Ottawa, 2005.
  • 3Advanced encryption standard (AES)[S]. Federal Information Processing Standards Publication 197, 2001.
  • 4Joan Daemen,Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard[M]. Springer-Verlag, 2002.
  • 5Hu xiang-dong, Wei Qin-fang. Applied cryptography[M]. Electronics Industry Press,2006.
  • 6Zheng Wei-min, et al interpreted. Computer organization and design: the hardware/software interface [M]. Beijing : Tsinghua University Press, 2003.
  • 7Zhang Kun-zang, et al interpreted. Computer organization and architecture: designing for performance[M]. Beijing: Tsinghua University Press, 2006.
  • 8Michael Neve. Cache-based vulnerabilities and SPAM analysis [D]. Doctor thesis, Universite Catholique de Louvain,2006.
  • 9OpenSSL the open-source toolkit for SSL/TLS [EB/OL]. http ://www. openssl. org/. 2005.
  • 10Dan Page. Partitioned cache architecture as a side-channel defense mechanism[R]. Cryptology ePrint Archive, Report 2005/ 280, 2005.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部