Measurement program: Investigation on cache-timing attack
Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. Th...
Saved in:
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Conference paper |
Published: |
2023
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-29679 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-296792023-12-28T15:30:45Z Measurement program: Investigation on cache-timing attack Khalid Y. Dippel U. Yussof S. 56355084400 25824819200 16023225600 AES Cache-timing attack Measurement program Side channel attacks Cryptography Digital television General purpose computers Security of data Black box system Complex systems Measurement programs Secret key Side channel attack Side-channel information Single input Single output Timing attacks Time measurement Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks. �2009 IEEE. Final 2023-12-28T07:30:45Z 2023-12-28T07:30:45Z 2009 Conference paper 10.1109/MICC.2009.5431494 2-s2.0-77952215942 https://www.scopus.com/inward/record.uri?eid=2-s2.0-77952215942&doi=10.1109%2fMICC.2009.5431494&partnerID=40&md5=01fabdeecb86a51025557d0da52d3fe1 https://irepository.uniten.edu.my/handle/123456789/29679 5431494 187 192 Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
topic |
AES Cache-timing attack Measurement program Side channel attacks Cryptography Digital television General purpose computers Security of data Black box system Complex systems Measurement programs Secret key Side channel attack Side-channel information Single input Single output Timing attacks Time measurement |
spellingShingle |
AES Cache-timing attack Measurement program Side channel attacks Cryptography Digital television General purpose computers Security of data Black box system Complex systems Measurement programs Secret key Side channel attack Side-channel information Single input Single output Timing attacks Time measurement Khalid Y. Dippel U. Yussof S. Measurement program: Investigation on cache-timing attack |
description |
Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks. �2009 IEEE. |
author2 |
56355084400 |
author_facet |
56355084400 Khalid Y. Dippel U. Yussof S. |
format |
Conference paper |
author |
Khalid Y. Dippel U. Yussof S. |
author_sort |
Khalid Y. |
title |
Measurement program: Investigation on cache-timing attack |
title_short |
Measurement program: Investigation on cache-timing attack |
title_full |
Measurement program: Investigation on cache-timing attack |
title_fullStr |
Measurement program: Investigation on cache-timing attack |
title_full_unstemmed |
Measurement program: Investigation on cache-timing attack |
title_sort |
measurement program: investigation on cache-timing attack |
publishDate |
2023 |
_version_ |
1806426182079479808 |
score |
13.223943 |