Measurement program: Investigation on cache-timing attack

Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. Th...

Full description

Saved in:
Bibliographic Details
Main Authors: Khalid Y., Dippel U., Yussof S.
Other Authors: 56355084400
Format: Conference paper
Published: 2023
Subjects:
AES
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-29679
record_format dspace
spelling my.uniten.dspace-296792023-12-28T15:30:45Z Measurement program: Investigation on cache-timing attack Khalid Y. Dippel U. Yussof S. 56355084400 25824819200 16023225600 AES Cache-timing attack Measurement program Side channel attacks Cryptography Digital television General purpose computers Security of data Black box system Complex systems Measurement programs Secret key Side channel attack Side-channel information Single input Single output Timing attacks Time measurement Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks. �2009 IEEE. Final 2023-12-28T07:30:45Z 2023-12-28T07:30:45Z 2009 Conference paper 10.1109/MICC.2009.5431494 2-s2.0-77952215942 https://www.scopus.com/inward/record.uri?eid=2-s2.0-77952215942&doi=10.1109%2fMICC.2009.5431494&partnerID=40&md5=01fabdeecb86a51025557d0da52d3fe1 https://irepository.uniten.edu.my/handle/123456789/29679 5431494 187 192 Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
topic AES
Cache-timing attack
Measurement program
Side channel attacks
Cryptography
Digital television
General purpose computers
Security of data
Black box system
Complex systems
Measurement programs
Secret key
Side channel attack
Side-channel information
Single input
Single output
Timing attacks
Time measurement
spellingShingle AES
Cache-timing attack
Measurement program
Side channel attacks
Cryptography
Digital television
General purpose computers
Security of data
Black box system
Complex systems
Measurement programs
Secret key
Side channel attack
Side-channel information
Single input
Single output
Timing attacks
Time measurement
Khalid Y.
Dippel U.
Yussof S.
Measurement program: Investigation on cache-timing attack
description Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks. �2009 IEEE.
author2 56355084400
author_facet 56355084400
Khalid Y.
Dippel U.
Yussof S.
format Conference paper
author Khalid Y.
Dippel U.
Yussof S.
author_sort Khalid Y.
title Measurement program: Investigation on cache-timing attack
title_short Measurement program: Investigation on cache-timing attack
title_full Measurement program: Investigation on cache-timing attack
title_fullStr Measurement program: Investigation on cache-timing attack
title_full_unstemmed Measurement program: Investigation on cache-timing attack
title_sort measurement program: investigation on cache-timing attack
publishDate 2023
_version_ 1806426182079479808
score 13.223943