Abstract
PDF HTML阅读 XML下载 导出引用 引用提醒 AES 访问驱动Cache 计时攻击 DOI: 10.3724/SP.J.1001.2011.03802 作者: 作者单位: 作者简介: 通讯作者: 中图分类号: 基金项目: 国家自然科学基金(60772082); 河北省自然科学基金(08M010) Access Driven Cache Timing Attack Against AES Author: Affiliation: Fund Project: 摘要 | 图/表 | 访问统计 | 参考文献 | 相似文献 | 引证文献 | 资源附件 | 文章评论 摘要:首先给出了访问驱动Cache 计时攻击的模型,提出了该模型下直接分析、排除分析两种通用的AES 加密泄漏Cache 信息分析方法;然后建立了AES 加密Cache 信息泄露模型,并在此基础上对排除分析攻击所需样本量进行了定量分析,给出了攻击中可能遇到问题的解决方案;最后结合OpenSSL v.0.9.8a,v.0.9.8j 中两种典型的AES 实现在Windows 环境下进行了本地和远程攻击共12 个实验.实验结果表明,访问驱动Cache 计时攻击在本地和远程均具有良好的可行性;AES 查找表和Cache 结构本身决定了AES 易遭受访问驱动Cache 计时攻击威胁,攻击最小样本量仅为13;去除T4 表的OpenSSL v.0.9.8j 中AES 最后一轮实现并不能防御该攻击;实验结果多次验证了AES 加密Cache 信息泄露和密钥分析理论的正确性. Abstract:Firstly, this paper displays an access driven Cache timing attack model, proposes non-elimination and elimination two general methods to analyze Cache information leakage during AES encryption, and builds the Cache information leakage model. Next, it uses quantitative analysis to attack a sample with the above elimination analysis method, and provides some solutions for the potential problems of a real attack. Finally, this paper describes 12 local and remote attacks on AES in OpenSSL v.0.9.8a, v.0.9.8j. Experiment results demonstrate that: the access driven Cache timing attack has strong applicability in both local and remote environments; the AES lookup table and Cache structure decide that AES is vulnerable to this type of attack, the least sample size required to recover a full AES key is about 13; the last round AES implementation in OpenSSL v.0.9.8j, which abandoned the T4 lookup table, cannot secure itself from the access driven Cache timing attack; the attack results strongly verify the correctness of the quantitative Cache information leakage theory and key analysis methods above. 参考文献 相似文献 引证文献
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.