Exploiting AES cache timing attack

Amir Herzberg herzbea at macs.biu.ac.il
Wed Jun 22 09:27:47 EDT 2005


Steven M. Bellovin wrote:
> Dan Bernstein has a new cache timing attack on AES:
> 
> 	http://cr.yp.to/antiforgery/cachetiming-20050414.pdf
<skip>
A question: could this be exploited by evil employee Eve in site A, 
whose corporation uses IP-Sec VPN tunneling between sites A and B, and 
which can (somehow!) eavesdrop on the (encrypted) communication on the 
Net but _not_ on the (plaintext) communication on the intranet, to 
decipher the communication of a pair of honest employees, Alice in A and 
Bob in B?

If so, what's the best defense?

-- 
Best regards,

Amir Herzberg

Associate Professor
Department of Computer Science
Bar Ilan University
http://AmirHerzberg.com

New: see my Hall Of Shame of Unprotected Login pages: 
http://AmirHerzberg.com/shame.html

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list