The search functionality is under construction.
The search functionality is under construction.

Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient

Junko TAKAHASHI, Toshinori FUKUNAGA, Kazumaro AOKI, Hitoshi FUJI

  • Full Text Views

    0

  • Cite this

Summary :

This paper proposes a new accurate evaluation method for examining the resistance of cryptographic implementations against access-driven cache attacks (CAs). We show that a mathematical correlation method between the sets of measured access time and the ideal data, which depend on the guessed key, can be utilized to evaluate quantitatively the correct key in access-driven CAs. We show the effectiveness of the proposed method using the access time measured in noisy environments. We also estimate the number of key candidates based on mathematical proof while considering memory allocation. Furthermore, based on the proposed method, we analyze quantitatively how the correlation values change with the number of plaintexts for a successful attack.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E98-A No.1 pp.192-202
Publication Date
2015/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1587/transfun.E98.A.192
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Foundation

Authors

Junko TAKAHASHI
  NTT Corporation
Toshinori FUKUNAGA
  NTT Corporation
Kazumaro AOKI
  NTT Corporation
Hitoshi FUJI
  NTT Corporation

Keyword