A Systematic Study of Cache Side Channels Across AES Implementations

While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to a...

Full description

Saved in:
Bibliographic Details
Published inEngineering Secure Software and Systems Vol. 10379; pp. 213 - 230
Main Authors Mantel, Heiko, Weber, Alexandra, Köpf, Boris
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2017
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3319621041
9783319621043
ISSN0302-9743
1611-3349
DOI10.1007/978-3-319-62105-0_14

Cover

Abstract While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to affect the vulnerability to side channels, but the concrete effects in actual AES implementations are not yet sufficiently well understood. In this article, we analyze and compare multiple off-the-shelf AES implementations wrt. their vulnerability to cache side-channel attacks. By applying quantitative program analysis techniques in a systematic fashion, we shed light on the influence of implementation techniques for AES on cache-side-channel leakage bounds.
AbstractList While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES implementations for storing precomputed results provide speedup for encryption and decryption. How such lookup tables are used is known to affect the vulnerability to side channels, but the concrete effects in actual AES implementations are not yet sufficiently well understood. In this article, we analyze and compare multiple off-the-shelf AES implementations wrt. their vulnerability to cache side-channel attacks. By applying quantitative program analysis techniques in a systematic fashion, we shed light on the influence of implementation techniques for AES on cache-side-channel leakage bounds.
Author Köpf, Boris
Mantel, Heiko
Weber, Alexandra
Author_xml – sequence: 1
  givenname: Heiko
  surname: Mantel
  fullname: Mantel, Heiko
  email: mantel@cs.tu-darmstadt.de
– sequence: 2
  givenname: Alexandra
  surname: Weber
  fullname: Weber, Alexandra
  email: weber@mais.informatik.tu-darmstadt.de
– sequence: 3
  givenname: Boris
  surname: Köpf
  fullname: Köpf, Boris
BookMark eNqNkEFOwzAQRQ0URFp6Axa-gGHGdp14WYUClSqxCKytxHFoIU1CnC56e9wWWLP60h-9r9Ebk1HTNo6QW4Q7BIjvdZwwwQRqpjjCjIFBeUamoRahPHZwTiJUiEwIqS_I-PcgcUQiEMCZjqW4IpHWHFWMKrkmU-8_AAATqSTXEXmY02zvB7fNh42l2bAr97StaJrbtaPZpnQ0XedN42pP57ZvfYhFRpfbrnZb1wyBaht_Qy6rvPZu-pMT8va4eE2f2erlaZnOV6zjSTIwHsfaJlxzq3VV6TIuyhKttiASLIpKQAGaywqrXHElXJkLC0UB3KpKOTUrxITw067v-k3z7npTtO2nNxjkBGcmyDHCBAvm6MccnAVInqCub792zg_GHSgbvu_z2q7zbnC9D4RWiieGAxjOxX-xmUIQUvxh3-3ufVY
ContentType Book Chapter
Copyright Springer International Publishing AG 2017
Copyright_xml – notice: Springer International Publishing AG 2017
DBID FFUUA
DEWEY 005.8
DOI 10.1007/978-3-319-62105-0_14
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783319621050
331962105X
EISSN 1611-3349
Editor Athanasopoulos, Elias
Payer, Mathias
Bodden, Eric
Editor_xml – sequence: 1
  fullname: Payer, Mathias
– sequence: 2
  fullname: Athanasopoulos, Elias
– sequence: 3
  fullname: Bodden, Eric
EndPage 230
ExternalDocumentID EBC6296628_200_223
EBC5610343_200_223
GroupedDBID 0D6
0DA
38.
AABBV
AALVI
ABBVZ
ABHTH
ABQUB
ACDJR
ADCXD
AEDXK
AEJLV
AEKFX
AETDV
AEZAY
AGIGN
AGYGE
AIODD
ALBAV
ALMA_UNASSIGNED_HOLDINGS
AZZ
BATQV
BBABE
CVWCR
CZZ
FFUUA
I4C
IEZ
SBO
SWYDZ
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-DT
-~X
29L
2HA
2HV
ACGFS
EJD
F5P
LAS
LDH
P2P
RSU
~02
ID FETCH-LOGICAL-p288t-2779c8292c99ff9d7bdd1c9c0381bbf30b0924f1fa6263eda3c0bb02c6f6e65b3
ISBN 3319621041
9783319621043
ISSN 0302-9743
IngestDate Tue Jul 29 19:44:36 EDT 2025
Thu May 29 00:07:18 EDT 2025
Thu May 29 15:58:38 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum TK5105.5-5105.9QA76.
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p288t-2779c8292c99ff9d7bdd1c9c0381bbf30b0924f1fa6263eda3c0bb02c6f6e65b3
OCLC 992167168
PQID EBC5610343_200_223
PageCount 18
ParticipantIDs springer_books_10_1007_978_3_319_62105_0_14
proquest_ebookcentralchapters_6296628_200_223
proquest_ebookcentralchapters_5610343_200_223
PublicationCentury 2000
PublicationDate 2017
20170624
PublicationDateYYYYMMDD 2017-01-01
2017-06-24
PublicationDate_xml – year: 2017
  text: 2017
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings
PublicationTitle Engineering Secure Software and Systems
PublicationYear 2017
Publisher Springer International Publishing AG
Springer International Publishing
Publisher_xml – name: Springer International Publishing AG
– name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
SSID ssj0001846429
ssj0002792
Score 1.920911
Snippet While the AES algorithm is regarded as secure, many implementations of AES are prone to cache side-channel attacks. The lookup tables traditionally used in AES...
SourceID springer
proquest
SourceType Publisher
StartPage 213
SubjectTerms Additional Lookup Table
Cache Set
Cache Side Channel
Cache Size Increases
Timing-based Attacks
Title A Systematic Study of Cache Side Channels Across AES Implementations
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=5610343&ppg=223
http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=6296628&ppg=223
http://link.springer.com/10.1007/978-3-319-62105-0_14
Volume 10379
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Nb9MwFLe6cgEOwADxLR-4RUFJnLjOgUM2iqYx7dIN7RbFji1ViGZqMyFx5C_nPX80aTcJjUtVRVaS-r2-79_PhHxEl6FT3saqbXSc65bHjWQ8Lgwoh5FFlkg75XvOTy7z06viajL5M5pauunlJ_X7TlzJ_0gVroFcESV7D8lubwoX4DvIFz5BwvC5F_zulll9O3_LJOiq5jpagE391fiOwJiL3JacETDiPM3yRzfqyPjzrB3SZb0109-wh37Ery1r41G3Xm7G6lX5-1vC10Vgpj5GeuhosWy1hS2swPFGlXXEUTVfOCrinx7t5MuEuFF68_nM9zLOu96OiEXhuIlgfcblidTO0mW3y5N7Bc6hxraTzzI0CJCEOuamgOsCmw1Zj7uknZnmSL7IHNnp1vSykRfPXLfnloMYz4QgfgufVsSQCOUH5GAm8il5UM1Pz74PdToI0HIMIb13R8JF15lyb4V4ofDWqWN0Gn7FCKt51yN3spq9RryNby6ekseIeaEIRoH9e0YmenVIngQRUC-CQ_JopHTPyZeKDkpArRLQzlCrBBSVgAYloE4JKCgB3VOCF-Ty6_zi-CT2p3LE15kQfZzNZqUSWZmpsjSmbGeybVNVKmw5S2lYIhPI6U1qGiQ60m3DVCJlkiluuOaFZC_JdNWt9CtCFeQWIm2QdlDlRuSNEULnTDeiFKZU5WsSh_2p7eyAH1hWbjc2NQb_LGd4lmoNce4_1_MMsvtMDOujsOk1Lt_UgcQbpFWzGqRVW2nVKK0391r9ljwc_g7vyLRf3-j3EL_28oNXsb8H0JD4
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Mantel%2C+Heiko&rft.au=Weber%2C+Alexandra&rft.au=K%C3%B6pf%2C+Boris&rft.atitle=A+Systematic+Study+of+Cache+Side+Channels+Across+AES+Implementations&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2017-06-24&rft.pub=Springer+International+Publishing&rft.isbn=9783319621043&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=213&rft.epage=230&rft_id=info:doi/10.1007%2F978-3-319-62105-0_14
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F5610343-l.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F6296628-l.jpg