[17532] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Exploiting AES cache timing attack

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Wed Jun 22 09:55:32 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 22 Jun 2005 15:27:47 +0200
From: Amir Herzberg <herzbea@macs.biu.ac.il>
Reply-To: herzbea@macs.biu.ac.il
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <20050616131853.93DF43BFE8D@berkshire.machshav.com>

Steven M. Bellovin wrote:
> Dan Bernstein has a new cache timing attack on AES:
> 
> 	http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
<skip>
A question: could this be exploited by evil employee Eve in site A, 
whose corporation uses IP-Sec VPN tunneling between sites A and B, and 
which can (somehow!) eavesdrop on the (encrypted) communication on the 
Net but _not_ on the (plaintext) communication on the intranet, to 
decipher the communication of a pair of honest employees, Alice in A and 
Bob in B?

If so, what's the best defense?

-- 
Best regards,

Amir Herzberg

Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com

New: see my Hall Of Shame of Unprotected Login pages: 
http://AmirHerzberg.com/shame.html

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post