Abstract
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated against the Advanced Encryption Standard (AES), but have more recently also been applied against other cryptographic primitives.
In this paper, we give a cache timing cryptanalysis of stream ciphers using word-based linear feedback shift registers (LFSRs), such as Snow, Sober, Turing, or Sosemanuk. Fast implementations of such ciphers use tables that can be the target for a cache timing attack. Assuming that a small number of noise-free cache timing measurements are possible, we describe a general framework showing how the LFSR state for any such cipher can be recovered using very little computational effort. For the ciphers mentioned above, we show how this knowledge can be turned into efficient cache-timing attacks against the full ciphers.
Original language | English |
---|---|
Title of host publication | Cryptography and Coding |
Place of Publication | Berlin |
Publisher | Springer |
Publication date | 2009 |
Publication status | Published - 2009 |
Event | 12th IMA International Conference on Cryptography and Coding - Cirencester, United Kingdom Duration: 15 Dec 2009 → 17 Dec 2009 Conference number: 12 |
Conference
Conference | 12th IMA International Conference on Cryptography and Coding |
---|---|
Number | 12 |
Country/Territory | United Kingdom |
City | Cirencester |
Period | 15/12/2009 → 17/12/2009 |
Series | Lecture Notes in Computer Science |
---|---|
Number | 5921 |
ISSN | 0302-9743 |