作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (17): 141-143. doi: 10.3969/j.issn.1000-3428.2008.17.050

• 安全技术 • 上一篇    下一篇

针对AES的基于时间的缓存攻击

李 波,胡予濮,钟名富   

  1. (西安电子科技大学计算机网络与信息安全教育部重点实验室,西安 710071)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-09-05 发布日期:2008-09-05

Time-based Cache Attacks on AES

LI Bo, HU Yu-pu, ZHONG Ming-fu   

  1. (Key Laboratory of Computer Networks & Information Security of Ministry of Education, Xidian University, Xi’an 710071)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-09-05 Published:2008-09-05

摘要: 基于时间的缓存攻击是指通过分析处理器中算法的不同执行时间来恢复密钥的攻击。该文分析针对AES的时间驱动缓存攻击,给出一种改进的攻击,它可以应用于大多数的AES实现软件。在PentiumⅢ, OpenSSL v.0.9.8.(a)和Miracl环境下的实验发现,只需要224个时间信息就可以恢复出密钥,少于原攻击的228个时间信息数据。给出抵抗这种攻击的对策。

关键词: 边信道, AES算法, S盒, 缓存攻击, 缓存未命中

Abstract: Time-based cache attacks analyzes the time difference in the execution of algorithm over a processor, and recovers the secret key. This paper investigates such an attack on AES. A modified version of this attack is shown. It can be applied in most AES software, and implemented against OpenSSL v.0.9.8(a) and Miracl running on PentiumⅢ. The attack is shown under optimal conditions to recover a full 128-bit AES key with 224 timing samples, less than 228 of the previously attack. It gives several countermeasures of such attack.

Key words: side channel, AES algorithm, S-boxes, cache attack, cache-miss

中图分类号: