RUS  ENG
Full version
JOURNALS // Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] // Archive

Mat. Vopr. Kriptogr., 2016 Volume 7, Issue 2, Pages 121–130 (Mi mvk190)

This article is cited in 3 papers

A timing attack on CUDA implementations of an AES-type block cipher

D. B. Fomin

Technical committee for standardization (TC 26), Moscow

Abstract: A timing attack against an AES-type block cipher CUDA implementation is presented. Our experiments show that it is possible to extract a secret AES $128$-bit key with complexity of $2^{32}$ chosen plaintext encryptions. This approach may be applied to AES with other key sizes and, moreover, to any block cipher with a linear transform that is a composition of two types of linear transformations on a substate.

Key words: AES, Kuznyechik, Grasshopper, timing attack, cache attack, software timing attacks, CUDA, GPU.

UDC: 519.671

Received 15.II.2015

Language: English

DOI: 10.4213/mvk190



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024