Presentation Outline Introduction to Side Channel Attacks

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
Information Security – Theory vs. Reality , Winter 2011 Guest Lecturer: Yossi Oren 1.
Lab7: Introduction to Arduino
Statistical Tools Flavor Side-Channel Collision Attacks
Differential Power Analysis of Smartcards How secure is your private information? Author: Ryan Junee Supervisor: Matt Barrie.
Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity 1.
Software Certification and Attestation Rajat Moona Director General, C-DAC.
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Side-Channel Attacks on Smart Cards. Timing Analysis Cryptosystems take different amount of time to process different inputs. Performance optimisations.
Secure Systems Design Ramesh Karri Office Hours: Tues/Wed/Thurs: 12:00- 1:30 in LC 001
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
1 Lect. 10 : Cryptanalysis. 2 Block Cipher – Attack Scenarios  Attacks on encryption schemes  Ciphertext only attack: only ciphertexts are given  Known.
H.M.Gamaarachchi (E/10/102) P.B.H.B.B.Ganegoda (E/10/104)
Advanced Information Security 6 SIDE CHANNEL ATTACKS Dr. Turki F. Al-Somani 2015.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Professional Encryption Software FINECRYPT 8.1. Contents Introduction Introduction Features Features Installation Installation Tests Tests Results Results.
Cryptographic Attacks on Scrambled LZ-Compression and Arithmetic Coding By: RAJBIR SINGH BIKRAM KAHLON.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Network Security – Special Topic on Skype Security.
Possible Testing Solutions and Associated Costs
Enhanced Doublng Attacks on Signed-All-Bits Set Recoding 1 Graduate School of Information Management and Security, Korea University, Korea
Kouichi Itoh, Tetsuya Izu and Masahiko Takenaka Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) August, 2002 Address-bit Differential.
Exploiting Cache-Timing in AES: Attacks and Countermeasures Ivo Pooters March 17, 2008 Seminar Information Security Technology.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Intro to Cryptography Lesson Introduction
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Power Analysis Attack on the Masking Type Conversion Algorithm Using Exponentiation Young In Cho', Dong-GukHan g, Seokhie Hong', Young-Ho Park a 'LIST.
New Methods for Cost-Effective Side- Channel Attacks on Cryptographic RFIDs Chair for Embedded Security Ruhr University Bochum David Oswald Timo Kasper.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
1 Information Security – Theory vs. Reality , Winter Lecture 3: Power analysis, correlation power analysis Lecturer: Eran Tromer.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Click to edit Present’s Name Three Attacks, Many Process Variations and One Expansive Countermeasure International Workshop on Cybersecurity Darshana Jayasinghe,
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Yossi Oren, yos strudel bgu.ac.il, yossioren System Security Engineering course, Dec
FlashBack-4 Development
Overview on Hardware Security
Symmetric Cryptography
Advanced Information Security 6 Side Channel Attacks
Automatic Application of Power Analysis Countermeasures
Xin Fang, Pei Luo, Yunsi Fei, and Miriam Leeser
Differential Power Analysis as a digital forensic tool
Ali Galip Bayrak EPFL, Switzerland June 7th, 2011
Data Encryption Standard
Chapter-2 Classical Encryption Techniques.
ATM using fingerprint
The Advanced Encryption Standard: Rijndael
NET 311 Information Security
ATTACKS ON WINZIP ENCRYPTION
Cryptography Basics and Symmetric Cryptography
Survey of Crypto CoProcessor Design
Unknown Input Attacks in the Parallel Setting Improving the Security of the CHES 2012 Leakage Resilient PRF Marcel Medwed François-Xavier Standaert Ventzislav.
High-Level Synthesis for Side-Channel Defense
امنیت و اعتماد سخت افزاری
Introduction to Symmetric-key and Public-key Cryptography
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
Security.
Provable Security at Implementation-level
Number Systems Instructions, Compression & Truth Tables.
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Operating System Concepts
SOHAIL SHAHUL HAMEED Dr. BHARGAVI GOSWAMI
Advanced Encryption Standard
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
1.3 Compression, Encryption & Hashing
Presentation transcript:

Side Channel Attacks Against the Arduino Uno Owen Lo Edinburgh Napier University

Presentation Outline Introduction to Side Channel Attacks Timing Attack Demo SPA/DPA/CPA Power Analysis Overview DPA/CPA attacks against the AES-128 S-Box on an Arduino Uno

Side Channel Attacks Side Channel Monitoring Power Heat Time Sound Plaintext Message Cryptographic Function Encrypted Message Secret Key A side channel attack is carried out by monitoring the physical outputs of a device (e.g. power consumption, time taken to carry out an operation, emission of heat, light and sound).

Timing Attacks In which we analyse the time taken for a system to execute certain tasks (e.g. encryption, decryption or password entry) to reveal information leakage.

Timing Attacks (Demo) Removed due to large file size. The mp4 video can be downloaded from: https://www.dropbox.com/s/906p8pwt0ksp8kk/timingattack.mp4?dl=0 Source Code based on: http://eax64.github.io/2015/04/10/timing-attack-on-arduino.html

Timing Attack - How did it work? The timing attack shown works due to this code within the ‘pin entry system’: int check(char *input) { int i; for (i = 0 ; i < 4 ; i++) if (input[i] != password[i]) return 0; return 1; } Each character in the input is verified consecutively leading this code to be vulnerable to timing attacks.

Power Analysis Correlate the level of power consumption to operations of the device under attack.

Categories of Power Analysis Attacks Three Main Categories: Simple Power Analysis (SPA) Differential Power Analysis (DPA) Correlation Power Analysis (CPA)

Simple Power Analysis (SPA) Visual Interpretation of power traces. 1 2 3 4 5 6 7 8 9 10 10 Rounds of AES-128

Differential Power Analysis (DPA) Detect small variations in power traces based on output of cryptographic operations. Example: output 1101 vs 1100 will produce different power consumption levels. LSB 1 LSB 0 Source: P. Kocher, J. Jaffe, B. Jun, and P. Rohatgi, “Introduction to differential power analysis,” J. Cryptogr. Eng., vol. 1, no. 1, pp. 5–27, 2011.

Correlation Power Analysis (CPA) Correlate actual power traces against hypothesised power model. Example: for secret key guess 65, can compare our hypothesised power model against the actual power result:

Attacking the AES-128 S-Box running on an Arduino Uno The experimental setup used for attacking AES-128 is shown below:

Photo of Probe Setup

1-Byte Cipher Key Result using DPA (AES-128)

1-Byte Cipher Key Result using CPA (AES-128)

16-Byte Cipher Key Result using DPA (AES-128)

16-Byte Cipher Key Result using CPA (AES-128)

Current Work (in progress) Building the work of OWASP, GSMA and others, we wish to investigate the possibility of producing a methodology to enable us to evaluate how ‘secure’ an IoT device is.

References O. Lo, W.J. Buchanan, D Carson, “Power Analysis Attacks on the AES-128 S-box using DPA and CPA”, J. Cyber Security Technology, 2016. Kocher P, Jaffe J, Jun B. Differential power analysis. In: Wiener M, editor. Advances in cryptology - CRYPTO’ 99: 19th annual international cryptology conference; Aug 15–19; Santa Barbara (CA). Berlin: Springer; 1999. p. 388–397.  Zhou Y, Feng D. Side-channel attacks: ten years after its publication and the impacts on cryptographic module security testing [Internet]. Cryptology ePrint archive. 2005 [cited 2016 Sep 6]. Available from: https://eprint.iacr.org/2005/388.pdf  Brier E, Clavier C, Olivier F. Correlation power analysis with a leakage model. Cryptogr Hardw Embed Syst. 2004;3156:16–29. Pub NF. 197: advanced encryption standard (AES). Fed Inf Process Stand Publ. 2001;197:441– 311. http://eax64.github.io/2015/04/10/timing-attack-on-arduino.html