A new Dynamic Cache Flushing (DCF) algorithm for preventing cache timing attack

Jalpa Bani, Syed S. Rizvi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Rijndael algorithm was unanimously chosen as the Advanced Encryption Standard (AES) by the panel of researchers at National Institute of Standards and Technology (NIST) in October 2000. Since then, Rijndael was destined to be used massively in various software as well as hardware entities for encrypting data. However, a few years back, Daniel Bernstein [2] devised a cache-timing attack that was capable enough to break Rijndael's seal that encapsulates the encryption key. In this paper, we propose a new Dynamic Cache Flushing (DCF) algorithm which shows a set of pragmatic software measures that would make Rijndael impregnable to cache timing attack. The simulation results demonstrate that the proposed DCF algorithm provides better security by encrypting key at a constant time.

Original languageEnglish (US)
Title of host publication7th Annual Wireless Telecommunications Symposium, WTS 2008
Pages399-404
Number of pages6
DOIs
StatePublished - 2008
Event7th Annual Wireless Telecommunications Symposium, WTS 2008 - Ponoma, CA, United States
Duration: Apr 24 2008Apr 26 2008

Publication series

Name7th Annual Wireless Telecommunications Symposium, WTS 2008

Other

Other7th Annual Wireless Telecommunications Symposium, WTS 2008
Country/TerritoryUnited States
CityPonoma, CA
Period4/24/084/26/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering
  • Communication

Fingerprint

Dive into the research topics of 'A new Dynamic Cache Flushing (DCF) algorithm for preventing cache timing attack'. Together they form a unique fingerprint.

Cite this