مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

748
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Survey of cache side channel attacks on the AES encryption algorithm implementation

Pages

  27-37

Keywords

AES 

Abstract

 With the development of the electronic industry and the advent of modern processors, the attack model in the algorithms and encryption protocols also changed. In spite of computational complexity in algorithms and cryptographic protocols, implementations can be a factor for the leakage of confidential information. The attacker can attack when electronic components are executing the encryption operators using the secret key on sensitive data. As a result of computing, there is a leak of information in electronic components where Attacks are called side-channel Attacks. one of the most important sources of information leakage of side channels is time changes due to the execution of computation. The accesses to memory and the presence of branches in the program are expensive at runtime, so the processors use Cache memory and branch-prediction to reduce this cost. Unfortunately, this optimization during execution leads to time changes in the execution of a program. The Cache in the time side-channel Attacks is more challenging and more practical. In this paper, we will review a variety of memory Attacks on the implementation of the AES cipher algorithm. by implementing the Attacks and comparing the results, we will extract and compare the security weaknesses of implementing the AES cipher algorithm against Cache Attacks.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    JADIDI, MOHAMMAD, esfehani, mahdi, & Mohammadgholi, Esmail. (2021). Survey of cache side channel attacks on the AES encryption algorithm implementation. INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING, 1(4 ), 27-37. SID. https://sid.ir/paper/384252/en

    Vancouver: Copy

    JADIDI MOHAMMAD, esfehani mahdi, Mohammadgholi Esmail. Survey of cache side channel attacks on the AES encryption algorithm implementation. INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING[Internet]. 2021;1(4 ):27-37. Available from: https://sid.ir/paper/384252/en

    IEEE: Copy

    MOHAMMAD JADIDI, mahdi esfehani, and Esmail Mohammadgholi, “Survey of cache side channel attacks on the AES encryption algorithm implementation,” INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING, vol. 1, no. 4 , pp. 27–37, 2021, [Online]. Available: https://sid.ir/paper/384252/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button