Improvement of trace-driven I-Cache timing attack on the RSA algorithm

  • Authors:
  • Caisen Chen;Tao Wang;Yingzhan Kou;Xiaocen Chen;Xiong Li

  • Affiliations:
  • Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China and Academy of Armored Force Engineering, Beijing 100072, China;Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;Department of Information Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;Department of Optical and Electrical Engineering, Ordnance Engineering College, Shijiazhuang 050003, China;School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The previous I-Cache timing attacks on the RSA algorithm which exploit the instruction path of a cipher are mostly proof-of-concept, and it is harder to put them into practice than D-Cache timing attacks. We propose a trace-driven timing attack model on the RSA algorithm via spying on the whole I-Cache, instead of the partial instruction cache to which the multiplication function mapped, by analyzing the complications in the previous I-Cache timing attack on the RSA algorithm. Then, an improved analysis algorithm of the exponent using the characteristic of the window size in SWE algorithm is provided, which could further reduce the search space of the key bits than the former. We further demonstrate how to recover the private key d from the scattered known bits of d"p and d"q, through demonstrating some conclusions and validating it by experimentation. In addition, an error detection mechanism to detect some erroneous decisions of the operation sequences is provided to reduce the number of the erroneous recovered bits, and improve the precision of decision. We implement an I-Cache timing attack on RSA of OpenSSL in a practical environment, the experimental results show that the feasibility and effectiveness of I-Cache timing attack can be improved.