From: Eu-Jin Goh <[EMAIL PROTECTED]> Subject: FRI 15 JULY 1630 HRS : Reflective side-channel cryptanalysis To: [EMAIL PROTECTED] Date: Mon, 11 Jul 2005 08:46:19 -0700
- ------------------------------------------------------- When - FRI 15th July 1630 hrs at Gates 4-B (opposite 490) Who - Eran Tromer, Weizmann Institute of Science What - Reflective side-channel cryptanalysis - ------------------------------------------------------- Abstract: Side-channel cryptanalysis exploits physical information leakage from cryptographic devices to undermine their security. Most side-channel attacks require special measurement equipment and are thus limited in applicability. This talk will present two side channels that can be exploited in many settings without special equipment. First, CPU cache contention leaks information on memory access patterns in several ways. Second, acoustic emanations from electronic circuit components can be information-bearing and are often detectable by a plain microphone. Applications of these side channels to RSA and AES will be shown. In some common cases these attacks can be carried out by software within the target computer, allowing an unprivileged process to glean secret information from privileged ones without any explicit interaction. This raises new challenges for multiuser, partitioned and sandboxed environments. Joint work with Dag Arne Osvik and Adi Shamir. - ------------------------------------------------------- Map to Gates Computer Science Building http://campus-map.stanford.edu/campus_map/results.jsp?bldg=gates&dept=&addr= - -++**==--++**==--++**==--++**==--++**==--++**==--++**== ---------- --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]