[17532] in cryptography@c2.net mail archive
Exploiting AES cache timing attack
daemon@ATHENA.MIT.EDU (Amir Herzberg)
Wed Jun 22 09:55:32 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Wed, 22 Jun 2005 15:27:47 +0200
From: Amir Herzberg <herzbea@macs.biu.ac.il>
Reply-To: herzbea@macs.biu.ac.il
To: "Steven M. Bellovin" <smb@cs.columbia.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <20050616131853.93DF43BFE8D@berkshire.machshav.com>
Steven M. Bellovin wrote:
> Dan Bernstein has a new cache timing attack on AES:
>
> http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
<skip>
A question: could this be exploited by evil employee Eve in site A,
whose corporation uses IP-Sec VPN tunneling between sites A and B, and
which can (somehow!) eavesdrop on the (encrypted) communication on the
Net but _not_ on the (plaintext) communication on the intranet, to
decipher the communication of a pair of honest employees, Alice in A and
Bob in B?
If so, what's the best defense?
--
Best regards,
Amir Herzberg
Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com
New: see my Hall Of Shame of Unprotected Login pages:
http://AmirHerzberg.com/shame.html
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com