Tampere University of Technology

TUTCRIS Research Portal

Cache-timing template attacks

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Details

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
Pages667-684
Number of pages18
DOIs
Publication statusPublished - 28 Dec 2009
Externally publishedYes
Publication typeA4 Article in a conference publication
Event15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009 - Tokyo, Japan
Duration: 6 Dec 200910 Dec 2009

Publication series

NameLecture Notes in Computer Science
Volume5912
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009
CountryJapan
CityTokyo
Period6/12/0910/12/09

Abstract

Cache-timing attacks are a serious threat to security-critical software. We show that the combination of vector quantization and hidden Markov model cryptanalysis is a powerful tool for automated analysis of cache-timing data; it can be used to recover critical algorithm state such as key material. We demonstrate its effectiveness by running an attack on the elliptic curve portion of OpenSSL (0.9.8k and under). This involves automated lattice attacks leading to key recovery within hours. We carry out the attack on live cache-timing data without simulating the side channel, showing these attacks are practical and realistic.

Keywords

  • Cache-timing attacks, Elliptic curve cryptography, Side channel attacks

Publication forum classification