位置:成果数据库 > 期刊 > 期刊详情页
一种新的针对AES的访问驱动Cache攻击
  • 期刊名称:小型微型计算机系统, 2009, 30(4):797-800.
  • 时间:0
  • 分类:TP309[自动化与计算机技术—计算机系统结构;自动化与计算机技术—计算机科学与技术]
  • 作者机构:[1]军械工程学院计算机工程系,河北石家庄050003
  • 相关基金:国家自然科学基金项目(60772082)资助,中国人民解放军军械工程学院院基金项目(Yjjxm07033)资助.
中文摘要:

Cache访问“命中”和“失效”会产生时间和能量消耗差异,这些差异信息已经成为加密系统的一种信息隐通道,密码界相继提出了计时Cache攻击、踪迹Cache攻击等Cache攻击方法.针对AES加密算法,提出一种新的Cache攻击-访问驱动Cache攻击,攻击从更细的粒度对Cache行为特征进行观察,利用间谍进程采集AES进程加密中所访问Cache行信息。通过直接分析和排除分析两种方法对采集信息进行分析,在大约20次加密样本条件下就可成功推断出128位完整密钥信息.

英文摘要:

"Cache hit" and "Cache miss" behavior will generate timing and power consumption differences , this could be used as a covert information leakage channel for cryptographic systems while visiting the Cache, several Cache attack methods such as Timing-Driven Cache Attack,Trace-Driven Cache Attack were proposed by many cryptographists. A new kind of cache attack, Access-Driven Cache Attack, was described in this paper against AES, this attack scrutinize the Cache behavior with a finer granularity, a spy process was used to gather the accessed Cache line set of the AES encryption process, with the application of non-elimination and elimination methods to analyze these measured information, approximately 20 encryption samples are required to recovered full 128 bits AES key with a high probability of success.

同期刊论文项目
同项目期刊论文