Side-Channel Attack

Cache-Timing Attach against AES Crypto-Systems Countermeasure Using Weighted Average Making Time Algorithm

Abstract:

Information leaked from encryption systems during its implementation is known as side-channel information and can lead to side-channel attacks. Side-channel attacks can be carried out if an attacker has access to a cryptosystem (victim) or can interact with it remotely. A cache-timing attack is a special type of side-channel attack during which an attacker can extract sensitive information (encryption key or plaintext) by collecting and analysing the variances in encryption timing caused by a cache miss/hit.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Principal Office

  • Journal of Information Warfare
  • ArmisteadTEC
  • 525 Landfall Arch,
  • Virginia Beach, VA 23462

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com