Due to the impact of micro-architectures and operating systems,the execution time of different S-Box lookups in block ciphers have some variance,which may cause the leakages of the S-Box lookup indexes.Utilizing the "byte oriented and divide and conquer" strategy in side channel analysis,this paper analyzes the resistance of AES implementations against Cache timing template attacks.First,the mechanism of different Cache access time is analyzed,and two Cache timing attacks are provided(collision-based and template-based).Second,the model of Cache timing external template attack is built,and a new template matching algorithm is proposed which is based on Pearson correlation factor.Two real attacks on the first and the last round of AES are launched successfully.To overcome the requirement of a template platform in external template attacks,an internal template attack is proposed and applied to AES.Finally,several extended attacks on AES are conducted under different settings,operating systems,Cache initial states,and crypto libraries.The experimental results are compared with the previous work,and an effective countermeasure is also suggested.