[17523] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: AES cache timing attack

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Jun 21 16:09:13 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: iang@systemics.com, pgut001@cs.auckland.ac.nz
Cc: cryptography@metzdowd.com, hal@finney.org,
	neuhaus@st.cs.uni-sb.de
In-Reply-To: <200506211422.01495.iang@systemics.com>
Date: Wed, 22 Jun 2005 01:33:57 +1200

Ian G <iang@systemics.com> writes:
>On Tuesday 21 June 2005 13:45, Peter Gutmann wrote:
>>Best Current Practice, a special-case type of RFC.  Based on recent experience
>>with this style of collaborative document editing, I've set up a wiki at
>>http://blockcipher.pbwiki.com/, blank username, password 'sbox', for anyone
>>who wants to add their $0.02 about what to do/what not to do to protect block
>>ciphers from side-channel attacks.  If it works out, this could turn into a
>>BCP.
>
>That's what I like, action, not words!  To celebrate this, I've stuck some
>words in there which others can act on ;-)

Uhh, that wasn't really what I was after, that's pretty much textbook stuff,
what I wanted was specifically advice on how to use block ciphers in a way
that avoids possibilities for side-channel (and similar) attacks.  I have some
initial notes that can be summarised as "Don't let yourself be used as an
oracle" that I was planning to add after I've fleshed them out a bit.

Peter.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post