-
-
[原创]eprint 2010 新发表文章“Improved Cache Trace Attack on AES and CLEFIA”
-
发表于: 2010-2-8 19:41 5376
-
网页链接 http://eprint.iacr.org/2010/056
PDF链接 http://eprint.iacr.org/2010/056.pdf
就算送大家的新年礼物了!
另外欢迎大家指教!
Cryptology ePrint Archive: Report 2010/056
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Xin-jie ZHAO and Tao WANG
Abstract: This paper presents an improved Cache trace attack on AES and CLEFIA by considering Cache miss trace information and S-box misalignment. In 2006, O. Acıiçmez et al. present a trace driven Cache attack on AES first two rounds, and point out that if the Cache element number of the Cache block is 16, at most 48-bit of AES key can be obtained in the first round attack. Their attack is based on the ideal case when S-box elements are perfected aligned in the Cache block. However, this paper discovers that, the S-box elements are usually misaligned, and due to this feature and by considering Cache miss trace information, about 200 samples are enough to obtain full 128-bit AES key within seconds. In 2010, Chester Rebeiro et al. present the first trace driven Cache attack on C LEFIA by considering Cache hit information and obtain 128-bit key with 243 CLEFIA encryptions. In this paper, we present a new attack on CLEFIA by considering Cache miss information and S-box misalignment features, finally successfully obtain CLEFIA-128 key for about 220 samples within seconds.
Category / Keywords: Trace Driven; Cache Attack; AES; CLEFIA; S-box Misalignment; Cache Miss
Date: received 2 Feb 2010, last revised 5 Feb 2010
PDF链接 http://eprint.iacr.org/2010/056.pdf
就算送大家的新年礼物了!
另外欢迎大家指教!
Cryptology ePrint Archive: Report 2010/056
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment
Xin-jie ZHAO and Tao WANG
Abstract: This paper presents an improved Cache trace attack on AES and CLEFIA by considering Cache miss trace information and S-box misalignment. In 2006, O. Acıiçmez et al. present a trace driven Cache attack on AES first two rounds, and point out that if the Cache element number of the Cache block is 16, at most 48-bit of AES key can be obtained in the first round attack. Their attack is based on the ideal case when S-box elements are perfected aligned in the Cache block. However, this paper discovers that, the S-box elements are usually misaligned, and due to this feature and by considering Cache miss trace information, about 200 samples are enough to obtain full 128-bit AES key within seconds. In 2010, Chester Rebeiro et al. present the first trace driven Cache attack on C LEFIA by considering Cache hit information and obtain 128-bit key with 243 CLEFIA encryptions. In this paper, we present a new attack on CLEFIA by considering Cache miss information and S-box misalignment features, finally successfully obtain CLEFIA-128 key for about 220 samples within seconds.
Category / Keywords: Trace Driven; Cache Attack; AES; CLEFIA; S-box Misalignment; Cache Miss
Date: received 2 Feb 2010, last revised 5 Feb 2010
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!
赞赏
他的文章
看原图
赞赏
雪币:
留言: