DocumentCode :
1917989
Title :
A New Dynamic Cache Flushing (DCF) algorithm for preventing cache timing attack
Author :
Bani, Jalpa ; Rizvi, Syed S.
Author_Institution :
Dept. of Comput. Sci. & Eng., Bridgeport Univ., Bridgeport, CT
fYear :
2008
fDate :
24-26 April 2008
Firstpage :
399
Lastpage :
404
Abstract :
Rijndael algorithm was unanimously chosen as the advanced encryption standard (AES) by the panel of researchers at National Institute of Standards and Technology (NIST) in October 2000. Since then, Rijndael was destined to be used massively in various software as well as hardware entities for encrypting data. However, a few years back, Daniel Bernstein devised a cache-timing attack that was capable enough to break Rijndael´s seal that encapsulates the encryption key. In this paper, we propose a new dynamic cache flushing (DCF) algorithm which shows a set of pragmatic software measures that would make Rijndael impregnable to cache timing attack. The simulation results demonstrate that the proposed DCF algorithm provides better security by encrypting key at a constant time.
Keywords :
cryptography; National Institute of Standards and Technology; Rijndael algorithm; Rijndael seal; advanced encryption standard; cache timing attack; dynamic cache flushing; encryption key; pragmatic software; security; Application software; Banking; Cryptography; Galois fields; NIST; Niobium; Optical fiber networks; Phased arrays; Timing; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Telecommunications Symposium, 2008. WTS 2008
Conference_Location :
Pomona, CA
ISSN :
1934-5070
Print_ISBN :
978-1-4244-1869-5
Electronic_ISBN :
1934-5070
Type :
conf
DOI :
10.1109/WTS.2008.4547594
Filename :
4547594
Link To Document :
بازگشت