Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Effectiveness of Countermeasures against Cache Attacks on Secret Key Cryptosystems, Study Guides, Projects, Research of Electrical and Electronics Engineering

A project investigating cache attacks against secret key cryptosystems, focusing on the effectiveness of countermeasures. A list of susceptible algorithms and libraries, questions to investigate, and a project schedule. The project aims to analyze cache attacks, their practicality in real-world environments, and proposed defenses.

Typology: Study Guides, Projects, Research

Pre 2010

Uploaded on 02/10/2009

koofers-user-y6b
koofers-user-y6b 🇺🇸

10 documents

1 / 3

Toggle sidebar

Related documents


Partial preview of the text

Download Effectiveness of Countermeasures against Cache Attacks on Secret Key Cryptosystems and more Study Guides, Projects, Research Electrical and Electronics Engineering in PDF only on Docsity! Brian Sanders ECE 746 Project Specifications Cache attacks against secrete key cryptosystems and Effectiveness of countermeasures Introduction Cryptography came about from a need to secure information. As the field quickly grew, so did the security of the algorithms that where used. As flaws where found in algorithms, new ones would be designed to avoid the attack methods. As these methods of attack where discovered, and understandings of how to write secure algorithms grew, algorithms would remain secure for longer periods of time. Today the field of cryptography has matured to the point where new algorithms are very complex, and hardened against many known attack methods. Many algorithms are analyzed by experts in the filed, and the mathematics behind the algorithm are very well understood and tested. As the algorithm it self becomes less of an available source of weakness, many researchers have begun to look at other methods of attack. Among these other methods, is a category know as “side channel attacks.” Side channel attacks have not necessarily been considered in most implementations today, and therefore provide a possibility of breaking an algorithm much more quickly than mathematical analysis. As the understanding of these new attacks progress, so will the defenses against them. As with any new method of attack, it is important fully understand these new attack methods, so that with time the defense to them can mature to the point where they do not provide the path of least resistance for attackers. One such proposed attack involves using cache access of the processor. Such an attack is based not on a direct mathematical fault of the algorithm, rather inadvertent information leakage due to implementation. This gives the attack the advantage of working against more than one specific algorithm, as long as they contain some of the same optimizations. With this form of attack the implementation of the algorithm could cause more problems than the algorithm its self. With a greater understanding of this attack, it should be possible to evaluate the effectiveness of proposed defense against it. Implementation comparisons It is most important to find what algorithms and libraries might contain such implementations, as to allow for this attack. The following lists may be considered, depending on available material. The time required to recreate this attack, and then test it for multiple implementations would most likely be far too great for the available time. As such, comparisons will be made based on available research material, and by reviewing specifications and implementations. Algorithms which may be considered  DES/3DES  AES  Twofish  Serpent  Blowfish  RC4 & RC6 Libraries which may be considered  OpenSSL  Crypto++ Questions to investigate While researching this type of attack, I will attempt to find answers for the following questions. Questions:  Are the above suggested algorithms/libraries susceptible to these types of attacks?  Are any of these attacks plausible in a real world environment?  Defense against these attacks o Are there proposed defenses for different types of cache attacks? o At what level should defenses be implemented  Microprocessor  operating system  application As this topic is analytical in nature, verification through testing may not be possible in the given time frame. This should provide a good basis for further expansion in the topic, providing direction to which areas real world test would be most beneficial. Project Schedule March 24th (1 month) First Progress report:  Make list of cache attacks to analyze  List of any proposed defenses to these attacks  Analysis of practicality of the attack in real world (for certain algorithms)  Analytical analysis of atleast ½ the suggested algorithms. April 14th (3 weeks) Second Progress report:  Analysis of remaining algorithms/libraries.  analysis of effectiveness of proposed defense  outline the successfulness or need for other defensive measures April 28th (2 weeks) Final progress report:  provide draft viewgraphs of presentation  Draw conclusions from previous analysis, determine practicality of these attacks/defenses May 8th (1 ½ weeks) Turn in project report May 10th (2 days) Turn in project report reviews May 12th (2 days) Final report and Presentation:  Provide final report with corrections from reviews  Provide final presentation slides, and present findings Areas of possible change As stated before, this project involves comparing multiple algorithms and libraries. Due to time constraints, it will not be possible to setup a lab scenario and test all possible combinations for the success or failure of this attack. Likewise it will not be possible to test all the defenses proposed, for all the algorithms and libraries. Therefore any of the above areas might be altered according to the availability of research and literature on the topics. If specifications do not have enough documentation to draw conclusions from, they might not be included in the final analysis. Likewise if other algorithms or libraries are discovered to provide sufficient documentation for analysis, they will be added to the lists above and included in the final report.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved