Loading...
Please wait, while we are loading the content...
Countermeasures against Timing Attack on AES
| Content Provider | CiteSeerX |
|---|---|
| Author | Kelapure, Advait Chandane, M. M. |
| Abstract | Abstract—Timing Attacks are a type of side channel attacks. In timing attacks, leaking cache timing information is used as the side channel. If the information about cache timing of a software implementation of AES is collected and analyzed by an attacker, the secret key of a crypto system can be deduced. Hence AES is fallible to timing attack. There are a few countermeasures in the form of software code implementation which changes behavior of AES to manipulate its timing information. But it causes decrease in speed of computation which reduces the performance. So there is a need to implement a new more efficient countermeasure which this paper tries to suggest. |
| File Format | |
| Access Restriction | Open |
| Subject Keyword | Timing Attack Hence Aes Side Channel Software Code Implementation Abstract Timing Attack Side Channel Attack Timing Information Crypto System Software Implementation Secret Key Cache Timing Efficient Countermeasure |
| Content Type | Text |
| Resource Type | Article |