Cache Timing Analysis of HC-256

Erik Zenner

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    In this paper, we describe an abstract model of cache timing attacks that can be used for designing ciphers. We then analyse HC-256 under this model, demonstrating a cache timing attack under certain strong assumptions. From the observations made in our analysis, we derive a number of design principles for hardening ciphers against cache timing attacks.
    Original languageEnglish
    Title of host publicationWorkshop Record SASC
    EditorsChristophe de Cannière
    Publication date2008
    Publication statusPublished - 2008
    EventSASC 2008: State of the Art of Stream Ciphers - Lausanne, Switzerland
    Duration: 13 Feb 200814 Feb 2008
    Conference number: 4
    http://www.ecrypt.eu.org/stvl/sasc2008/

    Workshop

    WorkshopSASC 2008: State of the Art of Stream Ciphers
    Number4
    Country/TerritorySwitzerland
    CityLausanne
    Period13/02/200814/02/2008
    Internet address

    Keywords

    • Stream Cipher
    • Cache Timing Attack

    Fingerprint

    Dive into the research topics of 'Cache Timing Analysis of HC-256'. Together they form a unique fingerprint.

    Cite this