SOFTWARE AND HARDWARE DEFENSE METHODS AGAINST CACHE-BASED SIDE CHANNEL ATTACKS
Journal: BEST : International Journal of Management, Information Technology and Engineering ( BEST : IJMITE ) (Vol.2, No. 5)Publication Date: 2014-05-31
Authors : DEEVI RADHA RANI; S. VENKATESWARLU;
Page : 9-14
Keywords : Cryptographic Algorithms; Cache Based Side Channel Attack; Software Defense; Hardware Defense;
Abstract
Cryptographic algorithms implementing on a cryptographic device leak information through side channels. Cache behavior in modern processors can be used as a side channel and retrieve the key used in cryptographic implementations. Cache based side channel attacks are serious hazard against modern computers with cache memory. This paper surveys the software and hardware defense methods against cache-based side channel attacks and analyze the efficient defense method against cache based side channel attack.
Other Latest Articles
- HCCI COMBUSTION: MATHEMATICAL MODELLING APPROACH USING VISUAL BASIC FOR APPLICATIONS
- KNOWLEDGE AND CULTURAL PRACTICES OF LIFE CARE: AN INTERPRETATION OF UNDERSTANDING INTERCULTURAL DIALOGUE ON STAGE FROM UNIVERSITY
- THE MUSICAL READINESS THROUGH MUSIC FORMATS OF OUR DAILY LIFE
- HEALTH PROBLEMS OF ELDERLY PEOPLE IN THANJAVUR DISTRICT-A SOCIOLOGICAL STUDY
- SYNTHESIS AND CHARACTERIZATION OF SOME NEW MONO AND BIS CYCLIC AZETIDIN-2-ONES
Last modified: 2014-06-30 15:16:29