Cache Timing Analysis of eStream Finalists

Abstract: Cache Timing Attacks have been primarily discussed in connection with the Advanced Encryption Standard (AES), where they are applicable in a very straightforward way. However, the underlying techniques can be applied to other cryptographic building blocks too, as becomes obvious when considering e.g. the AES-based stream cipher LEX.

In this talk, we will briefly review cache timing attacks and discuss their significance. We will then present some findings from our analysis of eStream finalist stream ciphers. While these findings do not seem to endanger the practical security of the ciphers considered, they illustrate some design techniques that help preventing cache timing attacks. In addition, they may give rise to some deeper questions about what is usually considered a success in the more standard areas of cryptanalysis.


"ZENNER Erik" is mentioned on: Home | Participants

(C) 2007 University of Luxembourg

Printable Version
VeryQuickWiki - HTML Export
Version: 2.7.1 (UniLux: 1.15.0 2006-01-19)
Modified: 2008-01-11 09:48:59
Exported: 2010-01-06 02:36:55