Master's Thesis

Breaking security of crypto systems using cache side-channel attack

Bruno Miguel Simões Lopes2021

Key information

Authors:

Bruno Miguel Simões Lopes (Bruno Miguel Simões Lopes)

Supervisors:

Tiago Miguel Braga da Silva Dias; Ricardo Jorge Fernandes Chaves (Ricardo Jorge Fernandes Chaves)

Published in

01/21/2021

Abstract

The focus of this research pretends to acknowledge the concept and structure of a typical side-channel attack and its variations. In a second phase, to dive into cache side-channel attacks that use timing records as side-channel information, for uncovering the secret key used by a victim cryptographic application. Thus, we implement an enhanced attack, based on Prime + Probe strategy, relying on the time differences between L1-D and the other cache levels latency. Our attack requires an unprivileged attack process running in the same CPU core as our victim, using SMT technology. The attack process can choose the plaintext values to input into our victim. Our victim application uses the inputted data to perform an AES encryption using OpenSSL functions. Additionally, we evaluate the success of the performed attack, using the amount of key information discovered, according to different vectors, such as the amount of side-channel information produced.

Publication details

Authors in the community:

Supervisors of this institution:

Fields of Science and Technology (FOS)

electrical-engineering-electronic-engineering-information-engineering - Electrical engineering, electronic engineering, information engineering

Publication language (ISO code)

eng - English

Rights type:

Embargo lifted

Date available:

12/05/2021

Institution name

Instituto Superior Técnico