ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SOFTWARE AND HARDWARE DEFENSE METHODS AGAINST CACHE-BASED SIDE CHANNEL ATTACKS

Journal: BEST : International Journal of Management, Information Technology and Engineering ( BEST : IJMITE ) (Vol.2, No. 5)

Publication Date:

Authors : ; ;

Page : 9-14

Keywords : Cryptographic Algorithms; Cache Based Side Channel Attack; Software Defense; Hardware Defense;

Source : Download Find it from : Google Scholarexternal

Abstract

Cryptographic algorithms implementing on a cryptographic device leak information through side channels. Cache behavior in modern processors can be used as a side channel and retrieve the key used in cryptographic implementations. Cache based side channel attacks are serious hazard against modern computers with cache memory. This paper surveys the software and hardware defense methods against cache-based side channel attacks and analyze the efficient defense method against cache based side channel attack.

Last modified: 2014-06-30 15:16:29