On Thu, May 8, 2014 at 2:32 AM, Kevin W. Wall <[email protected]> wrote: ... > > However, I don't think it's a panacea. Didn't someone have an > attack where they were able to reconstruct AES encryption keys > by recovering some fraction of the S-box values? I thought that > was either Felten, et al, Cold Boot attack or something that > was discussed in the literature around that time. Maybe I'm > just blabbering here since I can barely remember what I had > for lunch two days ago much less recall details of papers that > I've read from 5 or 6 years ago. Anyhow, I'm sure someone > on this list knows the details and I probably have it all wrong > anyway.
Amarcord. Halderman et al. "Lest We Remember: Cold Boot Attacks on Encryption Keys", in Proc. 17th USENIX Security Symposium (Sec ’08), San Jose, CA, July 2008, https://citp.princeton.edu/research/memory/ Later works improved upon Halderman et al. results. -- alfonso @secYOUre _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
