About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

In Topics in Cryptology - Ct-rsa 2010 — 2010, pp. 235-251

This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryptographic properties of AES, namely, on the MDS property of the linear code providing the diffusion matrix used in the MixColumns transform.

It is a chosen-plaintext attack where pairs of AES executions are treated differentially. The method can be easily converted into a chosen-ciphertext attack. We also thoroughly study the physical behavior of cache memory enabling this attack. On the practical side, we demonstrate that our theoretical findings lead to efficient real-world attacks on embedded systems implementing AES at the example of ARM9.

As this is one of the most wide-spread embedded platforms today [7], our experimental results might make a revision of the practical security of many embedded applications with security functionality necessary. To our best knowledge, this is the first paper to study cache timing attacks on embedded systems.

Language: English
Publisher: Springer Berlin Heidelberg
Year: 2010
Pages: 235-251
Proceedings: Cryptographers’ Track at the RSA Conference
ISBN: 1280385782 , 3642119247 , 3642119255 , 9781280385780 , 9783642119248 and 9783642119255
Types: Conference paper
DOI: 10.1007/978-3-642-11925-5_17

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis