首页
社区
课程
招聘
[原创]eprint 2010 新发表文章“Improved Cache Trace Attack on AES and CLEFIA”
发表于: 2010-2-8 19:41 5376

[原创]eprint 2010 新发表文章“Improved Cache Trace Attack on AES and CLEFIA”

2010-2-8 19:41
5376
网页链接 http://eprint.iacr.org/2010/056
  PDF链接 http://eprint.iacr.org/2010/056.pdf

   就算送大家的新年礼物了!
   另外欢迎大家指教!
Cryptology ePrint Archive: Report 2010/056
Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment

Xin-jie ZHAO and Tao WANG

Abstract: This paper presents an improved Cache trace attack on AES and CLEFIA by considering Cache miss trace information and S-box misalignment. In 2006, O. Acıiçmez et al. present a trace driven Cache attack on AES first two rounds, and point out that if the Cache element number of the Cache block is 16, at most 48-bit of AES key can be obtained in the first round attack. Their attack is based on the ideal case when S-box elements are perfected aligned in the Cache block. However, this paper discovers that, the S-box elements are usually misaligned, and due to this feature and by considering Cache miss trace information, about 200 samples are enough to obtain full 128-bit AES key within seconds. In 2010, Chester Rebeiro et al. present the first trace driven Cache attack on C LEFIA by considering Cache hit information and obtain 128-bit key with 243 CLEFIA encryptions. In this paper, we present a new attack on CLEFIA by considering Cache miss information and S-box misalignment features, finally successfully obtain CLEFIA-128 key for about 220 samples within seconds.

Category / Keywords: Trace Driven; Cache Attack; AES; CLEFIA; S-box Misalignment; Cache Miss

Date: received 2 Feb 2010, last revised 5 Feb 2010

[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回
//