A Practical Implementation of a New Flush+Reload Side Channel Attack on AES

Author(s):
Message:
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:

Since multiple memory accesses are time consuming, processors use cache to optimize runtime. The cache leads to temporal changes in the implementation of a program and is one of the most important source of information leakage in the timing side channel. Flush+Reload attack is a series of Cache Side Channel attack that the most important characteristics of this attack can be used to identify access to a particular memory line and target being the lowest level cache (LLC) noted that these features lead to increased precision of attack and its usability. In this paper, a new Flush+Reload attack (of the chosen plaintext attack) on the AES implemented in the OpenSSL is presented. While the previous Flush+Reload attack on AES requires about 400000 encryption operations, the attack presented in this paper, required only about 100 encryption operations to fully recover encryption keys. The attack described in this paper is implemented in practice and the actual results confirm the attack’s integrity.

Language:
Persian
Published:
Journal of Passive Defence Science and Technology, Volume:10 Issue: 4, 2020
Pages:
383 to 392
https://www.magiran.com/p2039590  
سامانه نویسندگان
  • Author (3)
    Mohammad Reza Aref
    Full Professor Electrical Engineering, Sharif University of Technology, Tehran, Iran
    Aref، Mohammad Reza
اطلاعات نویسنده(گان) توسط ایشان ثبت و تکمیل شده‌است. برای مشاهده مشخصات و فهرست همه مطالب، صفحه رزومه را ببینید.
مقالات دیگری از این نویسنده (گان)