A Systematic Study of Cache Side Channels Across AES Implementations
While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to a...
Saved in:
Published in | Engineering Secure Software and Systems Vol. 10379; pp. 213 - 230 |
---|---|
Main Authors | , , |
Format | Book Chapter |
Language | English |
Published |
Switzerland
Springer International Publishing AG
2017
Springer International Publishing |
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 3319621041 9783319621043 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-319-62105-0_14 |
Cover
Abstract | While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to affect the vulnerability to side channels, but the concrete effects in actual AES implementations are not yet sufficiently well understood. In this article, we analyze and compare multiple off-the-shelf AES implementations wrt. their vulnerability to cache side-channel attacks. By applying quantitative program analysis techniques in a systematic fashion, we shed light on the influence of implementation techniques for AES on cache-side-channel leakage bounds. |
---|---|
AbstractList | While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to affect the vulnerability to side channels, but the concrete effects in actual AES implementations are not yet sufficiently well understood. In this article, we analyze and compare multiple off-the-shelf AES implementations wrt. their vulnerability to cache side-channel attacks. By applying quantitative program analysis techniques in a systematic fashion, we shed light on the influence of implementation techniques for AES on cache-side-channel leakage bounds. |
Author | Köpf, Boris Mantel, Heiko Weber, Alexandra |
Author_xml | – sequence: 1 givenname: Heiko surname: Mantel fullname: Mantel, Heiko email: mantel@cs.tu-darmstadt.de – sequence: 2 givenname: Alexandra surname: Weber fullname: Weber, Alexandra email: weber@mais.informatik.tu-darmstadt.de – sequence: 3 givenname: Boris surname: Köpf fullname: Köpf, Boris |
BookMark | eNqNkEFOwzAQRQ0URFp6Axa-gGHGdp14WYUClSqxCKytxHFoIU1CnC56e9wWWLP60h-9r9Ebk1HTNo6QW4Q7BIjvdZwwwQRqpjjCjIFBeUamoRahPHZwTiJUiEwIqS_I-PcgcUQiEMCZjqW4IpHWHFWMKrkmU-8_AAATqSTXEXmY02zvB7fNh42l2bAr97StaJrbtaPZpnQ0XedN42pP57ZvfYhFRpfbrnZb1wyBaht_Qy6rvPZu-pMT8va4eE2f2erlaZnOV6zjSTIwHsfaJlxzq3VV6TIuyhKttiASLIpKQAGaywqrXHElXJkLC0UB3KpKOTUrxITw067v-k3z7npTtO2nNxjkBGcmyDHCBAvm6MccnAVInqCub792zg_GHSgbvu_z2q7zbnC9D4RWiieGAxjOxX-xmUIQUvxh3-3ufVY |
ContentType | Book Chapter |
Copyright | Springer International Publishing AG 2017 |
Copyright_xml | – notice: Springer International Publishing AG 2017 |
DBID | FFUUA |
DEWEY | 005.8 |
DOI | 10.1007/978-3-319-62105-0_14 |
DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783319621050 331962105X |
EISSN | 1611-3349 |
Editor | Athanasopoulos, Elias Payer, Mathias Bodden, Eric |
Editor_xml | – sequence: 1 fullname: Payer, Mathias – sequence: 2 fullname: Athanasopoulos, Elias – sequence: 3 fullname: Bodden, Eric |
EndPage | 230 |
ExternalDocumentID | EBC6296628_200_223 EBC5610343_200_223 |
GroupedDBID | 0D6 0DA 38. AABBV AALVI ABBVZ ABHTH ABQUB ACDJR ADCXD AEDXK AEJLV AEKFX AETDV AEZAY AGIGN AGYGE AIODD ALBAV ALMA_UNASSIGNED_HOLDINGS AZZ BATQV BBABE CVWCR CZZ FFUUA I4C IEZ SBO SWYDZ TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -DT -~X 29L 2HA 2HV ACGFS EJD F5P LAS LDH P2P RSU ~02 |
ID | FETCH-LOGICAL-p288t-2779c8292c99ff9d7bdd1c9c0381bbf30b0924f1fa6263eda3c0bb02c6f6e65b3 |
ISBN | 3319621041 9783319621043 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 19:44:36 EDT 2025 Thu May 29 00:07:18 EDT 2025 Thu May 29 15:58:38 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
LCCallNum | TK5105.5-5105.9QA76. |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-p288t-2779c8292c99ff9d7bdd1c9c0381bbf30b0924f1fa6263eda3c0bb02c6f6e65b3 |
OCLC | 992167168 |
PQID | EBC5610343_200_223 |
PageCount | 18 |
ParticipantIDs | springer_books_10_1007_978_3_319_62105_0_14 proquest_ebookcentralchapters_6296628_200_223 proquest_ebookcentralchapters_5610343_200_223 |
PublicationCentury | 2000 |
PublicationDate | 2017 20170624 |
PublicationDateYYYYMMDD | 2017-01-01 2017-06-24 |
PublicationDate_xml | – year: 2017 text: 2017 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Cham |
PublicationSeriesSubtitle | Security and Cryptology |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSeriesTitleAlternate | Lect.Notes Computer |
PublicationSubtitle | 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings |
PublicationTitle | Engineering Secure Software and Systems |
PublicationYear | 2017 |
Publisher | Springer International Publishing AG Springer International Publishing |
Publisher_xml | – name: Springer International Publishing AG – name: Springer International Publishing |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Naor, Moni Mitchell, John C. Terzopoulos, Demetri Steffen, Bernhard Pandu Rangan, C. Kanade, Takeo Kittler, Josef Weikum, Gerhard Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni – sequence: 8 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. – sequence: 9 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard – sequence: 10 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri – sequence: 11 givenname: Doug surname: Tygar fullname: Tygar, Doug – sequence: 12 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard |
SSID | ssj0001846429 ssj0002792 |
Score | 1.920911 |
Snippet | While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES... |
SourceID | springer proquest |
SourceType | Publisher |
StartPage | 213 |
SubjectTerms | Additional Lookup Table Cache Set Cache Side Channel Cache Size Increases Timing-based Attacks |
Title | A Systematic Study of Cache Side Channels Across AES Implementations |
URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5610343&ppg=223 http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6296628&ppg=223 http://link.springer.com/10.1007/978-3-319-62105-0_14 |
Volume | 10379 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLe6cgEOwADxLR-4RUFJnLjOgUM2iqYx7dIN7RbFji1ViGZqMyFx5C_nPX80aTcJjUtVRVaS-r2-79_PhHxEl6FT3saqbXSc65bHjWQ8Lgwoh5FFlkg75XvOTy7z06viajL5M5pauunlJ_X7TlzJ_0gVroFcESV7D8lubwoX4DvIFz5BwvC5F_zulll9O3_LJOiq5jpagE391fiOwJiL3JacETDiPM3yRzfqyPjzrB3SZb0109-wh37Ery1r41G3Xm7G6lX5-1vC10Vgpj5GeuhosWy1hS2swPFGlXXEUTVfOCrinx7t5MuEuFF68_nM9zLOu96OiEXhuIlgfcblidTO0mW3y5N7Bc6hxraTzzI0CJCEOuamgOsCmw1Zj7uknZnmSL7IHNnp1vSykRfPXLfnloMYz4QgfgufVsSQCOUH5GAm8il5UM1Pz74PdToI0HIMIb13R8JF15lyb4V4ofDWqWN0Gn7FCKt51yN3spq9RryNby6ekseIeaEIRoH9e0YmenVIngQRUC-CQ_JopHTPyZeKDkpArRLQzlCrBBSVgAYloE4JKCgB3VOCF-Ty6_zi-CT2p3LE15kQfZzNZqUSWZmpsjSmbGeybVNVKmw5S2lYIhPI6U1qGiQ60m3DVCJlkiluuOaFZC_JdNWt9CtCFeQWIm2QdlDlRuSNEULnTDeiFKZU5WsSh_2p7eyAH1hWbjc2NQb_LGd4lmoNce4_1_MMsvtMDOujsOk1Lt_UgcQbpFWzGqRVW2nVKK0391r9ljwc_g7vyLRf3-j3EL_28oNXsb8H0JD4 |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Mantel%2C+Heiko&rft.au=Weber%2C+Alexandra&rft.au=K%C3%B6pf%2C+Boris&rft.atitle=A+Systematic+Study+of+Cache+Side+Channels+Across+AES+Implementations&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2017-06-24&rft.pub=Springer+International+Publishing&rft.isbn=9783319621043&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=213&rft.epage=230&rft_id=info:doi/10.1007%2F978-3-319-62105-0_14 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5610343-l.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6296628-l.jpg |