Key recovery attack and analysis on GPUs그래픽카드에 대한 키 복구 공격과 분석

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 444
  • Download : 0
In addition to graphic operations, graphics cards are used as computing devices for various purposes such as physical system simulation and machine learning. Recently, encryption algorithms have been offloaded to the graphics card, which shows a speedup of up to 28 times. In this situation, an attack to recover the key using the time difference between AES calculations on the graphics card was introduced in 2016. In this thesis, we apply the above attacks on the graphics cards of Maxwell and Pascal generations, and show that the attack does not work. The signal of the key recovery attack is defined as SIMT vulnerabilities, and the noise is defined as timing variance. Maxwell and Pascal generation graphics cards show low signal and high noise. The reason for the lower SIMT vulnerability is shown to be higher interconnect channel bandwidth. The reason for the increased timing variance is that there are periodic timing jumps when read from the constant memory region. We also tried to increase the signal level by saturating the interconnect channel bandwidth, and trying to find the timing channel in the noise through the percentage filter.
Advisors
Kim, Dong Junresearcher김동준researcher
Description
한국과학기술원 :정보보호대학원,
Publisher
한국과학기술원
Issue Date
2018
Identifier
325007
Language
eng
Description

학위논문(석사) - 한국과학기술원 : 정보보호대학원, 2018.8,[v, 26 p. :]

Keywords

GPU▼atiming channel attack▼aAES▼acryptography▼ainformation security; 그래픽 카드▼a타이밍 채널 공격▼aAES▼a암호▼a정보 보호

URI
http://hdl.handle.net/10203/267168
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=828641&flag=dissertation
Appears in Collection
IS-Theses_Master(석사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0