Echternach Symmetric Crypto seminar ( ESC); 1

Activity: Lecture and oral contribution

View graph of relations
Cache Timing Attacks have been primarily discussed in connection with the Advanced Encryption Standard (AES), where they are applicable in a very straightforward way. However, the underlying techniques can be applied to other cryptographic building blocks too, as becomes obvious when considering e.g. the AES-based stream cipher LEX. In this talk, we will briefly review cache timing attacks and discuss their significance. We will then present some findings from our analysis of eStream finalist stream ciphers. While these findings do not seem to endanger the practical security of the ciphers considered, they illustrate some design techniques that help preventing cache timing attacks. In addition, they may give rise to some deeper questions about what is usually considered a success in the more standard areas of cryptanalysis.
Place: Echternach (Luxembourg)
Download as:
Download as PDF
Select render style:
ShortLong
PDF
Download as HTML
Select render style:
ShortLong
HTML
Download as Word
Select render style:
ShortLong
Word

ID: 2348447