Measurement program

Investigation on cache-timing attack

Yasir Khalid, Uwe Dippel, Salman Yussof

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks.

Original languageEnglish
Title of host publicationProceedings - MICC 2009
Subtitle of host publication2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents
Pages187-192
Number of pages6
DOIs
Publication statusPublished - 01 Dec 2009
Event2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents, MICC 2009 - Kuala Lumpur, Malaysia
Duration: 15 Dec 200917 Dec 2009

Publication series

NameProceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents

Other

Other2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents, MICC 2009
CountryMalaysia
CityKuala Lumpur
Period15/12/0917/12/09

Fingerprint

General purpose computers
hardware
Cryptography
Large scale systems
Hardware
Side channel attack

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Communication

Cite this

Khalid, Y., Dippel, U., & Yussof, S. (2009). Measurement program: Investigation on cache-timing attack. In Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents (pp. 187-192). [5431494] (Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents). https://doi.org/10.1109/MICC.2009.5431494
Khalid, Yasir ; Dippel, Uwe ; Yussof, Salman. / Measurement program : Investigation on cache-timing attack. Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents. 2009. pp. 187-192 (Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents).
@inproceedings{670147817d854ae1b676b85130fc4a88,
title = "Measurement program: Investigation on cache-timing attack",
abstract = "Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks.",
author = "Yasir Khalid and Uwe Dippel and Salman Yussof",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/MICC.2009.5431494",
language = "English",
isbn = "9781424455324",
series = "Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents",
pages = "187--192",
booktitle = "Proceedings - MICC 2009",

}

Khalid, Y, Dippel, U & Yussof, S 2009, Measurement program: Investigation on cache-timing attack. in Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents., 5431494, Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents, pp. 187-192, 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents, MICC 2009, Kuala Lumpur, Malaysia, 15/12/09. https://doi.org/10.1109/MICC.2009.5431494

Measurement program : Investigation on cache-timing attack. / Khalid, Yasir; Dippel, Uwe; Yussof, Salman.

Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents. 2009. p. 187-192 5431494 (Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Measurement program

T2 - Investigation on cache-timing attack

AU - Khalid, Yasir

AU - Dippel, Uwe

AU - Yussof, Salman

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks.

AB - Recent cryptanalysis is able to reduce the strength of a cipher, without breaking the cipher as such, like in traditional cryptographic attacks. This is achieved by obtaining, and subsequently utilizing, some hardware information to recover the secret key or the message, or at least part thereof. This kind of attack is called side channel attack, and has changed the conceptual idea of cryptography from a black box system with a single input and a single output to a complex system, that produces plural, unexpected outputs, the so-called side-channel information in addition to the intended cryptographic output. This additional output can be used to break an implementation of a cipher. Cache-timing is one type of side channel attacks that is mostly done in general purpose computers. In this paper we are investigating cache-timing attacks, and show some experimental results that motivated us to develop a portable measurement program for such attacks.

UR - http://www.scopus.com/inward/record.url?scp=77952215942&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77952215942&partnerID=8YFLogxK

U2 - 10.1109/MICC.2009.5431494

DO - 10.1109/MICC.2009.5431494

M3 - Conference contribution

SN - 9781424455324

T3 - Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents

SP - 187

EP - 192

BT - Proceedings - MICC 2009

ER -

Khalid Y, Dippel U, Yussof S. Measurement program: Investigation on cache-timing attack. In Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents. 2009. p. 187-192. 5431494. (Proceedings - MICC 2009: 2009 IEEE 9th Malaysia International Conference on Communications with a Special Workshop on Digital TV Contents). https://doi.org/10.1109/MICC.2009.5431494