Advanced Encryption Standard Cache Timing Key Disclosure Vulnerability

High-speed implementations of AES are prone to a timing attack vulnerability. The attack is based on observations of time taken to complete certain critical AES cryptographic functions (Input dependant Table lookups).

An attacker may theoretically exploit this issue to retrieve an entire AES secret key from a target vulnerable AES implementation.


 

Privacy Statement
Copyright 2010, SecurityFocus