|
This article is cited in 3 scientific papers (total in 3 papers)
A timing attack on CUDA implementations of an AES-type block cipher
D. B. Fomin Technical committee for standardization (TC 26), Moscow
Abstract:
A timing attack against an AES-type block cipher CUDA implementation is presented. Our experiments show that it is possible to extract a secret AES $128$-bit key with complexity of $2^{32}$ chosen plaintext encryptions. This approach may be applied to AES with other key sizes and, moreover, to any block cipher with a linear transform that is a composition of two types of linear transformations on a substate.
Key words:
AES, Kuznyechik, Grasshopper, timing attack, cache attack, software timing attacks, CUDA, GPU.
Received 15.II.2015
Citation:
D. B. Fomin, “A timing attack on CUDA implementations of an AES-type block cipher”, Mat. Vopr. Kriptogr., 7:2 (2016), 121–130
Linking options:
https://www.mathnet.ru/eng/mvk190https://doi.org/10.4213/mvk190 https://www.mathnet.ru/eng/mvk/v7/i2/p121
|
Statistics & downloads: |
Abstract page: | 690 | Full-text PDF : | 494 | References: | 76 | First page: | 13 |
|