Sliding Windows Succumbs to Big Mac Attack Colin D. Walter www.co.umist.ac.uk.

Slides:



Advertisements
Similar presentations
Side-Channel Attacks on RSA with CRT Weakness of RSA Alexander Kozak Jared Vanderbeck.
Advertisements

CRT RSA Algorithm Protected Against Fault Attacks WISTP - 5/10/07 Arnaud BOSCHER Spansion EMEA Robert NACIRI Oberthur Card Systems Emmanuel PROUFF Oberthur.
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks JaeCheol Ha * and SangJae Moon ** * Korea Nazarene University **
Chapter 6 Sampling and Sampling Distributions
Is there Safety in Numbers against Side Channel Leakage? Colin D. Walter UMIST, Manchester, UK
Maintaining Variance and k-Medians over Data Stream Windows Brian Babcock, Mayur Datar, Rajeev Motwani, Liadan O’Callaghan Stanford University.
Public Key Cryptosystems - RSA Receiver Sender Eavesdroppe r p q p q p q p and q prime.
Capstone Project Presentation A Tool for Cryptography Problem Generation CSc 499 Mark Weston Winter 2006.
C ● O ● M ● O ● D ● O RESEARCH LAB Longer Keys may Facilitate Side Channel Attacks (Bradford, UK) Colin.
C. Walter, Data Integrity for Modular Arithmetic, CHES 2000 CHES 2000 Data Integrity in Hardware for Modular Arithmetic Colin Walter Computation Department,
Abdullah Sheneamer CS591-F2010 Project of semester Presentation University of Colorado, Colorado Springs Dr. Edward RSA Problem and Inside PK Cryptography.
Homework #4 Solutions Brian A. LaMacchia Portions © , Brian A. LaMacchia. This material is provided without.
RSA Attacks 1 RSA Implementation Attacks RSA Attacks 2 RSA  RSA o Public key: (e,N) o Private key: d  Encrypt M C = M e (mod N)  Decrypt C M = C d.
Chapter 7 Sampling and Sampling Distributions
Side-Channel Attacks on Smart Cards. Timing Analysis Cryptosystems take different amount of time to process different inputs. Performance optimisations.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
Part III: Inference Topic 6 Sampling and Sampling Distributions
Montgomery’s Multiplication Technique: How to make it Smaller and Faster Colin D. Walter Computation Department, UMIST, UK
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
The RSA Algorithm Rocky K. C. Chang, March
Analysis of Variance. ANOVA Probably the most popular analysis in psychology Why? Ease of implementation Allows for analysis of several groups at once.
CS 312: Algorithm Analysis Lecture #3: Algorithms for Modular Arithmetic, Modular Exponentiation This work is licensed under a Creative Commons Attribution-Share.
Template attacks Suresh Chari, Josyula R. Rao, Pankaj Rohatgi IBM Research.
RSA Ramki Thurimella.
ELEC 528 Lecture Farinaz Koushanfar, Spring 2009 ECE and CS Depts., Rice University.
Issues of Security with the Oswald-Aigner Exponentiation Algorithm Colin D Walter Comodo Research Lab, Bradford, UK Colin D Walter.
9th IMA Conference on Cryptography & Coding Dec 2003 More Detail for a Combined Timing and Power Attack against Implementations of RSA Werner Schindler.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
1 Number Theory and Advanced Cryptography 5. Cryptanalysis of RSA Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Slide 1 Vitaly Shmatikov CS 380S Timing Attacks. slide 2 Reading uKocher. “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems”
Exploiting the Order of Multiplier Operands: A Low-Cost Approach for HCCA Resistance Poulami Das and Debapriya Basu Roy under the supervision of Dr. Debdeep.
26 Apr 2009Paul Dauncey1 Digital ECAL: Lecture 1 Paul Dauncey Imperial College London.
Some Security Aspects of the Randomized Exponentiation Algorithm (Bradford, UK) Colin D. Walter M IST.
DPA Countermeasures by Improving the Window Method Kouichi Itoh, Jun Yajima, Masahiko Takenaka and Naoya Torii Workshop on Cryptographic Hardware and Embedded.
Kouichi Itoh, Tetsuya Izu and Masahiko Takenaka Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) August, 2002 Address-bit Differential.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli Colin D. Walter formerly: (Manchester,
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Optimizing Robustness while Generating Shared Secret Safe Primes Emil Ong and John Kubiatowicz University of California, Berkeley.
M IST : An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis Colin D. Walter formerly: (Manchester, UK)
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
IEEE ARITH 17 Cape Cod, 27th – 29th June 2005 Data Dependent Power Use in Multipliers Colin D. Walter David Samyde
M IST : An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis Colin D. Walter (Manchester, UK)
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli Colin D. Walter formerly: (Manchester,
Remote Timing Attacks are Practical David Brumley Dan Boneh [Modified by Somesh.
Power Analysis Attack on the Masking Type Conversion Algorithm Using Exponentiation Young In Cho', Dong-GukHan g, Seokhie Hong', Young-Ho Park a 'LIST.
Implementation Issues for Public Key Algorithms
1/16 Seeing through M IST given a Small Fraction of an RSA Private Key Colin D. Walter Comodo Research Lab (Bradford, UK)
WISA 2007 Jeju Island, Korea, 27th – 29th Aug 2007 Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones Colin D. Walter
Lecture7 –More on Attacks Rice ELEC 528/ COMP 538 Farinaz Koushanfar Spring 2009.
Fermat’s Little Theorem The RSA Cryptosystem will require exponentiation to decrypt messages. Exponentiation Notation Example 1: Compute Exponentials Example.
Implementation of Public Key Encryption Algorithms
0x1A Great Papers in Computer Security Vitaly Shmatikov CS 380S
Data Word Length Reduction for Low- Power DSP Software Kyungtae Han March 24, 2004.
Message Authentication Codes CSCI 5857: Encoding and Encryption.
Lecture 6. RSA Use in Encryption to encrypt a message M the sender: – obtains public key of recipient PU={e,n} – computes: C = M e mod n, where 0≤M
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
Known-Plaintext-Only Attack on RSA-CRT with Montgomerry Multiplication
Public Key Cryptography
Simple Power Analysis of
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
PV204 Security technologies
Public Key Cryptosystems - RSA
Distinguishing Exponent Digits by Observing Modular Subtractions
Parametric Methods Berlin Chen, 2005 References:
Colin D. Walter Comodo CA, Bradford, UK
Measurements and Calculations
Presentation transcript:

Sliding Windows Succumbs to Big Mac Attack Colin D. Walter

CHES 2001C.D. Walter, UMIST2 Aims Re-think the power of DPA; Use it on a single exponentiation; Longer keys are more unsafe!

CHES 2001C.D. Walter, UMIST3 DPA Attack on RSA Summary: Differential Power Analysis (DPA) is used to determine the secret exponent in an embedded RSA cryptosystem. Assumption: The implementation uses a small multiplier whose power consumption is data dependent and measurable.

CHES 2001C.D. Walter, UMIST4 History P. Kocher, J. Jaffe & B. Jun Introduction to Differential Power Analysis and Related Attacks Crypto 99 T. S. Messerges, E.A. Dabbish & R.H. Sloan Power Analysis Attacks of Modular Exponentiation in Smartcards CHES 99

CHES 2001C.D. Walter, UMIST5 Multipliers Switching a gate in the H/W requires more power than not doing so; On average, a Mult-Acc op n a×b+c has data dependent contributions roughly linear in the Hamming weights of a and b; Variation occurs because of the initial state set up by the previous mult-acc op n.

CHES 2001C.D. Walter, UMIST6 First Results This theory was checked by simulation and found to be broadly correct; Refinements were made to this model (which will be reported elsewhere); These give a more precise & detailed partial ordering.

CHES 2001C.D. Walter, UMIST7 Combining Traces I The long integer product A×B in an exponentiation contains a large number of small digit multiply-accumulates: a i ×b j +c k Identify the power subtraces of each a i ×b j +c k from the power trace of A×B; Average the power traces for fixed i as j varies: this gives a trace tr i which depends on a i but only the average of the digits of B.

CHES 2001C.D. Walter, UMIST8 Combining Traces a0b0a0b0 a0b1a0b1 a0b2a0b2 a0b3a0b3

CHES 2001C.D. Walter, UMIST9 Combining Traces a0b0a0b0

CHES 2001C.D. Walter, UMIST10 Combining Traces a0b0a0b0 a0b1a0b1

CHES 2001C.D. Walter, UMIST11 Combining Traces a0b0a0b0 a0b1a0b1 a0b2a0b2

CHES 2001C.D. Walter, UMIST12 Combining Traces a0b0a0b0 a0b1a0b1 a0b2a0b2 a0b3a0b3

CHES 2001C.D. Walter, UMIST13 Combining Traces

CHES 2001C.D. Walter, UMIST14 Combining Traces a 0  (b 0 +b 1 +b 2 +b 3 )/4 Average the traces:

CHES 2001C.D. Walter, UMIST15 b is effectively an average random digit; So trace is characteristic of a 0 only, not B. tr 0 Combining Traces a0ba0b _ _

CHES 2001C.D. Walter, UMIST16 Combining Traces II The dependence of tr i on B is minimal if B has enough digits; Concatenate the average traces tr i for each a i to obtain a trace tr A which reflects properties of A much more strongly than those of B; The smaller the multiplier or the larger the number of digits (or both) then the more characteristic tr A will be.

CHES 2001C.D. Walter, UMIST17 Combining Traces tr 0

CHES 2001C.D. Walter, UMIST18 Combining Traces tr 0 tr 1

CHES 2001C.D. Walter, UMIST19 Combining Traces tr 0 tr 1 tr 2

CHES 2001C.D. Walter, UMIST20 Combining Traces tr 0 tr 1 tr 2 tr 3

CHES 2001C.D. Walter, UMIST21 Question: Is the trace tr A sufficiently characteristic to determine repeated use of a multiplier A in an exponentiation routine? Combining Traces tr A

CHES 2001C.D. Walter, UMIST22 Distinguish Digits? Averaging over the digits of B has reduced the noise level; In m-ary exponentiation we only need to distinguish: –squares from multiplies –the multipliers A (1), A (2), A (3), …, A (m–1) For small enough m and large enough number of digits they can be distinguished in a simulation of clean data.

CHES 2001C.D. Walter, UMIST23 Distances between Traces tr 0 tr 1 d(0,1) = (  i=0 ( tr 0 (i)  tr 1 (i) ) 2 ) ½ n i n0 power

CHES 2001C.D. Walter, UMIST24 Simulation tr 0 tr 1 d(0,1) = (  i=0 ( tr 0 (i)  tr 1 (i) ) 2 ) ½ n i n0 gate switch count

CHES 2001C.D. Walter, UMIST25 Simulation Results 16-bit multiplier, 4-ary exp n, 512-bit modulus. d(i,j) = distance between traces for ith and jth multiplications of exp n. Av d for same multipliers 2428 gates SD for same multipliers 1183 Av d for different multipliers23475 gates SD for different multipliers 481

CHES 2001C.D. Walter, UMIST26 Simulation Results Equal exponent digits can be identified – their traces are close; Unequal exponent digit traces are not close; Squares can be distinguished from mult ns : their traces are not close to any other traces; There are very few errors for typical cases.

CHES 2001C.D. Walter, UMIST27 Exp nt Digit Values Pre-computations A (i+1)  A  A (i) mod M provide traces for known multipliers. So: We can determine which mult ive op ns are squares; We can determine the exp digit for each mult n ; Minor extra detail for i = 0, 1 and m–1; This can be done independently for each op n.

CHES 2001C.D. Walter, UMIST28 Some Conclusions The independence means attack time proportional to secret key length; Longer modulus means better discrimination between traces; No greater safety against this attack from longer keys.

CHES 2001C.D. Walter, UMIST29 Warning single exponentiationWith the usual DPA averaging already done, it may be possible to use a single exponentiation to obtain the secret key; So using exp nt d+rφ(M) with random r may be no defence.So using exp nt d+rφ(M) with random r may be no defence.

CHES 2001C.D. Walter, UMIST30 Final Conclusions Sliding Windows exp n method may be broken in this way; Like a Big Mac, you can nibble away at each secret exponent digit in turn and enjoy finding out its value.