In The Name of Allah Fault attacks on ECC

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

CRT RSA Algorithm Protected Against Fault Attacks WISTP - 5/10/07 Arnaud BOSCHER Spansion EMEA Robert NACIRI Oberthur Card Systems Emmanuel PROUFF Oberthur.
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks JaeCheol Ha * and SangJae Moon ** * Korea Nazarene University **
Spreading Alerts Quietly and the Subgroup Escape Problem Aleksandr Yampolskiy (Yale) Joint work with James Aspnes, Zoë Diamadi, Kristian Gjøsteen, and.
Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
Lecture 8: Lattices and Elliptic Curves
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
Hidden Markov Model Cryptanalysis Chris Karlof and David Wagner.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Side-Channel Attacks on Smart Cards. Timing Analysis Cryptosystems take different amount of time to process different inputs. Performance optimisations.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
CRYPTOGRAPHY WHAT IS IT GOOD FOR? Andrej Bogdanov Chinese University of Hong Kong CMSC 5719 | 6 Feb 2012.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Torturing OpenSSL Todd Austin University of Michigan with Andrea Pellegrini, William Arthur and Valeria Bertacco (Based on Valeria’s BlackHat 2012 Presentation)
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
Bob can sign a message using a digital signature generation algorithm
By Abhijith Chandrashekar and Dushyant Maheshwary.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 10 – Digital Signatures.
Fault Tolerant Infective Countermeasure for AES
1 Optimal Mail Certificates in Mail Payment Applications Leon Pintsov Pitney Bowes 2nd CACR Information Security Workshop 31 March 1999.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
Computer Science CSC 774 Advanced Network Security Topic 2.6 ID Based Cryptography #2 Slides by An Liu.
Advanced Information Security 6 SIDE CHANNEL ATTACKS Dr. Turki F. Al-Somani 2015.
Cryptography Lecture 9 Stefan Dziembowski
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
Exploiting the Order of Multiplier Operands: A Low-Cost Approach for HCCA Resistance Poulami Das and Debapriya Basu Roy under the supervision of Dr. Debdeep.
Kouichi Itoh, Tetsuya Izu and Masahiko Takenaka Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) August, 2002 Address-bit Differential.
Elliptic curve cryptography ECC is an asymmetric cryptosystem based on the elliptic curve discrete log problem. The ECDLP arises in Abelian groups defined.
Attacking RSA Brian Winant Reference “Twenty Years of Attacks on the RSA Cryptosystem” By Dan Boneh In Notices of the American Mathematical.
Elliptic Curve Cryptography
Elliptic Curve Cryptography Celia Li Computer Science and Engineering November 10, 2005.
A Cross-Protocol Attack on the TLSProtocol Nikos Mavrogiannopoulos, Frederik Vercauteren, VesselinVelichkov, Bart Preneel. Presented by: Nitin Subramanian.
WISA 2007 Jeju Island, Korea, 27th – 29th Aug 2007 Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones Colin D. Walter
Assignment #3 Solutions January 24, Practical Aspects of Modern Cryptography Problem #1 Use Fermat’s Little Theorem and induction on k to prove.
Lattice-based Fault Attacks on DSA – Another Possible Strategy Tomáš Rosa,
1 Network Security Dr. Syed Ismail Shah
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Cryptographic Insecurity of the Test&Repeat Paradigm Tomáš Rosa, eBanka, a.s., Charles University, Prague, Czech Technical University in.
Elliptic Curve Public Key Cryptography Why ? ● ECC offers greater security for a given key size. ● The smaller key size also makes possible much more compact.
Elliptic Curve Public Key Cryptography
Overview on Hardware Security
Asymmetric-Key Cryptography
Advanced Information Security 6 Side Channel Attacks
Efficient CRT-Based RSA Cryptosystems
Elliptic Curve Cryptography (ECC)
Elliptic Curve Cryptography (ECC)
The Application of Elliptic Curves Cryptography in Embedded Systems
Practical Aspects of Modern Cryptography
Introduction to Cryptography
Diffie-Hellman Key Exchange
How to Use Charm Crypto Lib
Presentation transcript:

In The Name of Allah Fault attacks on ECC Fereshte Mozafari Arezoo Dabaghi

FLOW Introduction Fault attacks Differential fault attack & its countermeasure Sign change fault attack & its countermeasure References Hardware Security and Trust, CE, SUT

Introduction Elliptic curve is cryptographically strong An EC over Fp (p > 3) satisfy with: Y2 = x3 + ax2 + b (mod p) In cryptosystems based on EC, a crucial computation is the scalar multiplication of a public base point P with a secret scalar factor k. Q = kP Attacks aim to recover the value of k. Elliptic curve is cryptographically strong Hardware Security and Trust, CE, SUT

Fault Attacks Differential Fault Attack(DFA) Sign Change Fault Attack(SCFA) M Safe- Error Analysis C Safe- Error Analysis Invalid Curve Analysis Invalid Point Analysis Hardware Security and Trust, CE, SUT

Differential fault attack(0) Scalar multiplication Q = k.P P, 𝐸 /𝐹 𝑝 , p

Differential fault attack(1) Preliminaries If enforce a fault randomly in a register than can recover secret key in expected polynomial time binary length of n is k 𝑄 𝑖 value stored in variable Q before iteration I 𝑄′ 𝑖 𝑖𝑠 a disturbed Q−value Hardware Security and Trust, CE, SUT

Differential fault attack(2) Method Run ECSM once and collect the correct result ( 𝑄 𝑛 ) Enforce register fault in a register holding the variable Q , in iteration n-m < j < n n-1 j 𝑄′ 𝑗 Hardware Security and Trust, CE, SUT

Differential fault attack(3) 3. Find the index of the first iteration j’ with j’ > j and 𝑘 𝑗′ =1 n-1 j’ j 𝑄′ 𝑗′ Hardware Security and Trust, CE, SUT

Differential fault attack(4) 4. find candidate for the disturbed Q-value 𝑄′ 𝑗′ 1. check each i with ( n-m < i < n) as candidate for j’ 2. x = {0; 1} 𝑛−𝑖 as candidate for the n-i most significant bit of k n-1 j’=i j 𝑥 𝑥 Hardware Security and Trust, CE, SUT

Differential fault attack(4) 4. find candidate for the disturbed Q-value 𝑄′ 𝑗′ n-1 j’=i j (𝑥 𝑥 . 2 𝑖 .P)’ 𝑄′ 𝑥𝑖 = 𝑄′ 𝑗′ 𝑄 𝑥𝑖 𝑡 = 𝑄 𝑛 - 𝑥 𝑥 . 2 𝑖 .P Hardware Security and Trust, CE, SUT

Differential fault attack(5) 5. For each choice of x and i we consider all disturbed Q- values ( 𝑄′ 𝑥𝑖 ) with can derive from 𝑄 𝑥𝑖 by flipping one bit. 6. calculate 𝑄′ 𝑛 by : Hardware Security and Trust, CE, SUT

Differential fault attack(6) 7. if 𝑄′ 𝑛 is identical by 𝑄′ 𝑛 of device i as a candidate for j’ 𝑄′ 𝑥𝑖 as a candidate for 𝑄′ 𝑗′ binary representation of x as a candidate for upper n-j’ of k Hardware Security and Trust, CE, SUT

Countermeasure for DFA intermediate results (Qi , Hi )should be regularly checked randomize the scalar k Hardware Security and Trust, CE, SUT

SCFA on ECC(1) Over NAF-based left-to-right doubling algorithm Hardware Security and Trust, CE, SUT

SCFA on ECC(2) Basic idea: recover the bits of k in pieces of 1 ≤ r ≤ m bits A SCF changes the sign of y-coordinate of an attacked point Q  Qf Hardware Security and Trust, CE, SUT

SCFA on ECC(3) the only unknown part is Li (k) This allows to recover bits of k starting from the LSB + - Hardware Security and Trust, CE, SUT

Injection of SCF on Qi ‘(1) Input: access to algorithm1 n the length of private key, k > 0 in NAF Q = kP, m a parameter for acceptable amount of offline work Output: k with probability at least 1/2 #Step1: Collect faulty output collect the set S by including SCF on Qi’ Hardware Security and Trust, CE, SUT

Injection of SCF on Qi ‘(2) #step2: Inductive Retrieval of Secret Key Bits 1. Set s := -1 2. While(s < n-1) do 3. Set 4. For all lengths of r = 1,2,…,m do 5. For all valid NAF-patterns x = (xs+1,xs+2,…,xs+r) do S+1 LSBs of k are known Compute known LSB part Try all possible bit pattern with length r Hardware Security and Trust, CE, SUT

Injection of SCF on Qi ‘(3) 6. Set 7. For all do 8. If then 9. conclude ks+1 = xs+1, ks+2 = xs+2,…, ks+r = xs+r , set s := s + r Compute test condidate Tx Verify Tx Hardware Security and Trust, CE, SUT

Injection of SCF on Qi ‘(4) 10. If no test candidate satisfies the verification step,then assume that ks+1 = 0, set s := s + 1 11. continue at Line 2 12. Verify Q = kP If this fails then output ”failure” 13. Output “k” Hardware Security and Trust, CE, SUT

Countermeasure for SCFA(1) Uses a second elliptic curve whose order is a small prime number(t) to verify the final results E = Ep := E( Fp ) Et := E( Ft ) Ept is defined with parameters Apt and Bpt Apt ≡ Ap mod p, Apt ≡ At mod t Bpt ≡ Bp mod p, Bpt ≡ Bt mod t Qpt = k Ppt Hardware Security and Trust, CE, SUT

Countermeasure for SCFA(2) Attacks in Line 4 cannot yield a faulty output Hardware Security and Trust, CE, SUT

References 1. J. Blomer, M. Otto, J. Seifert“Sign Change Fault Attacks On Elliptic Curve Cryptosystems,” Fault Diagnousis and Tolerance iv Cryptograghy , pp. 36-52, 2006. 2. J. Fan, I. Verbouwhede, “An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost,” Cryptography and Security, pp. 265-282, 2012. 3. J. Fan, X. Gue, E. Mulder, “State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures,” International Symposium on Hardware-Oriented Security and Trust , pp. 165-171, 2010. 4. I. Biehel, B. Meyer, V. Muller, "Diferential Fault Attacks on Elliptic Curve Cryptosystems," Advance in Cryptography, pp. 131-141, 2000. 5. B. Johannes, O. Martin, S. Jean-Pierre, ‘Sign Change Fault Attacks on Elliptic Curve Cryptosystems” Hardware Security and Trust, CE, SUT

When that you think every thing is hidden and no one can see within , remember my friend , God can