A Systematic Study of Cache Side Channels Across AES Implementations
While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to a...
Saved in:
Published in | Engineering Secure Software and Systems Vol. 10379; pp. 213 - 230 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2017
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 3319621041 9783319621043 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-319-62105-0_14 |
Cover
Loading…
Summary: | While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to affect the vulnerability to side channels, but the concrete effects in actual AES implementations are not yet sufficiently well understood. In this article, we analyze and compare multiple off-the-shelf AES implementations wrt. their vulnerability to cache side-channel attacks. By applying quantitative program analysis techniques in a systematic fashion, we shed light on the influence of implementation techniques for AES on cache-side-channel leakage bounds. |
---|---|
ISBN: | 3319621041 9783319621043 |
ISSN: | 0302-9743 1611-3349 |
DOI: | 10.1007/978-3-319-62105-0_14 |