International Association for Cryptologic Research

Ph.D. Database

The aim of the IACR Ph.D. database is twofold. On the first hand, we want to offer an overview of Ph.D. already completed in the domain of cryptology. Where possible, this should also include a subject classification, an abstract, and access to the full text. On the second hand, it deals with Ph.D. subjects currently under investigation. This way, we provide a timely map of contemporary research in cryptology. All entries or changes need to be approved by an editor. You can contact them via phds (at)


Chester Rebeiro (#1028)
Name Chester Rebeiro
Personal Homepage
Topic of his/her doctorate. Analysis of Time Driven Cache Attacks on Block Ciphers
Category implementation
Ph.D. Supervisor(s) Debdeep Mukhopadhyay
Year of completion 2013
Abstract Most ciphers in use today are vulnerable to a class of attacks known as side-channel attacks. These attacks utilize information leakage through unintentional covert channels like time, power consumption, and electro-magnetic radiation of the device executing the cipher. For block ciphers, cache memories present in modern microprocessors play a crucial role in abetting side-channel leakage. Attacks that make use of leakage caused by cache memories are called cache-attacks. This thesis analyzes a category of cache-attacks known as time-driven cache attacks, which uses execution time to glean secret information from the cipher. The ease with which time measurements can be made and the wide applicability of the attack makes the study of time-driven cache attacks important for present and future security systems. In order to have a deeper understanding of the attack, the the sis categorizes time-driven cache attacks as either profiled or non-profiled and develops analytical tools to evaluate the attack across implementations and platforms. The tools developed encapsulates and parameterizes block cipher algorithms, their implementations, cache memories in superscalar processors, and time-driven cache attack algorithms. These tools are employed to pinpoint sources of leakage in block cipher algorithms and components in the cache memory, and thereafter quantify the information leakage due to each source. Specific to the leakage in cache memories, the thesis shows that micro-architectural acceleration features present in cache memories, such as pipelining, prefetching, non-blocking, and out-of-order servicing of cache misses can significantly affect information leakage. This has provided several counter-intuitive results such as cipher implementations with small look-up tables leaking more information than implementations that use large look-up tables, and that certain forms of time-driven cache attacks can be prevented by manipulating the size and number of look-up tables used in the implementation. This can potentially result in implementations that are not only protected against time-driven cache attacks but also implementations that do not compromise on performance. The correctness of the tools developed have been extensively validated on state-of-the-art block ciphers like AES, CLEFIA, CAMELLIA, and DES, and have been tested on popular Intel and AMD platforms
Last Change 2014-07-13 07:32:44
To provide an update on this entry, please click .

Contact: phds (at)

[ IACR home page ] [ IACR PhDs page ] © IACR