Advanced Encryption Standard Cache Timing Key Disclosure Vulnerability
High-speed implementations of AES are prone to a timing attack vulnerability. The attack is based on observations of time taken to complete certain critical AES cryptographic functions (Input dependant Table lookups). An attacker may theoretically exploit this issue to retrieve an entire AES secret key from a target vulnerable AES implementation. |
Privacy Statement |