Master's Thesis
Breaking security of crypto systems using cache side-channel attack
2021
—Key information
Authors:
Supervisors:
Published in
01/21/2021
Abstract
The focus of this research pretends to acknowledge the concept and structure of a typical side-channel attack and its variations. In a second phase, to dive into cache side-channel attacks that use timing records as side-channel information, for uncovering the secret key used by a victim cryptographic application. Thus, we implement an enhanced attack, based on Prime + Probe strategy, relying on the time differences between L1-D and the other cache levels latency. Our attack requires an unprivileged attack process running in the same CPU core as our victim, using SMT technology. The attack process can choose the plaintext values to input into our victim. Our victim application uses the inputted data to perform an AES encryption using OpenSSL functions. Additionally, we evaluate the success of the performed attack, using the amount of key information discovered, according to different vectors, such as the amount of side-channel information produced.
Publication details
Authors in the community:
Bruno Miguel Simões Lopes
ist182457
Supervisors of this institution:
Ricardo Jorge Fernandes Chaves
ist143817
Fields of Science and Technology (FOS)
electrical-engineering-electronic-engineering-information-engineering - Electrical engineering, electronic engineering, information engineering
Publication language (ISO code)
eng - English
Rights type:
Embargo lifted
Date available:
12/05/2021
Institution name
Instituto Superior Técnico