Covert timing channels, caching, and cryptography

Billy Bob Brumley

    Research output: ThesisDoctoral ThesisCollection of Articles

    Abstract

    Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryptographic primitive but the implementation of it. Examples of side-channels include power consumption or timing measurements. This is a young but very active field within applied cryptography. Modern processors are equipped with numerous mechanisms to improve the average performance of a program, including but not limited to caches. These mechanisms can often be used as side-channels to attack software implementations of cryptosystems. This area within side-channel analysis is called microarchitecture attacks, and those dealing with caching mechanisms cache-timing attacks. This dissertation presents a number of contributions to the field of side-channel analysis. The introductory portion consists of a review of common cache architectures, a literature survey of covert channels focusing mostly on covert timing channels, and a literature survey of cache-timing attacks, including selective related results that are more generally categorized as side-channel attacks such as traditional timing attacks. This dissertation includes eight publications relating to this field. They contain contributions in areas such as side-channel analysis, data cache-timing attacks, instruction cache-timing attacks, traditional timing attacks, and fault attacks. Fundamental themes also include attack mitigations and efficient yet secure software implementation of cryptosystems. Concrete results include, but are not limited to, four practical side-channel attacks against OpenSSL, each implemented and leading to full key recovery.
    Translated title of the contributionCovert timing channels, caching, and cryptography
    Original languageEnglish
    QualificationDoctor's degree
    Awarding Institution
    • Aalto University
    Supervisors/Advisors
    • Nyberg, Kaisa, Supervising Professor
    Publisher
    Print ISBNs978-952-60-4416-3
    Electronic ISBNs978-952-60-4417-0
    Publication statusPublished - 2011
    MoE publication typeG5 Doctoral dissertation (article)

    Keywords

    • cryptography
    • covert channels
    • side-channel analysis
    • timing attacks
    • cache-timing attacks

    Fingerprint

    Dive into the research topics of 'Covert timing channels, caching, and cryptography'. Together they form a unique fingerprint.

    Cite this