Cache-collision timing attacks against AES-GCM

Author(s)Huang, Bonan
Date Accessioned2011-06-28T12:04:06Z
Date Available2011-06-28T12:04:06Z
Publication Date2010
AbstractSide-channel attacks that utilize timing, power consumption, and electromagnetic radiation to gain information about an encryption/decryption implementation have been demonstrated experimentally to be an effective attack against a variety of cryptographic systems. We define a general attack strategy against AES-GCM using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption. The attacks presented should be applicable to most high-speed software AES-GCM implementations and computing platforms, we have implemented them against Openssl-1.0.0-beta3 running on Intel(R) Xeon(R) CPU 5110 and Intel(R) Xeon(R) CPU 5520. This is the first time in publication to successfully attack the AES-GCM algorithm. While the task of defending AES-GCM against all timing attacks is challenging, a small patch can significantly reduce the vulnerability to these specific attacks with no performance penalty.en_US
AdvisorLi, Xiaoming
DegreeM.S.
DepartmentUniversity of Delaware, Department of Electrical and Computer Engineering
URLhttp://udspace.udel.edu/handle/19716/9765
PublisherUniversity of Delawareen_US
dc.subject.lcshCache memory
dc.subject.lcshComputer algorithms
dc.subject.lcshCyberterrorism
TitleCache-collision timing attacks against AES-GCMen_US
TypeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Bonan_Huang_thesis.pdf
Size:
501.35 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed upon to submission
Description: