【24h】

Fault-based attack of RSA authentication

机译:基于故障的RSA身份验证攻击

获取原文

摘要

For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to extract secret information about the software, but it would also be extremely hard for the software to detect that an attack is underway. In this work we detail a complete end-to-end fault-attack on a microprocessor system and practically demonstrate how hardware vulnerabilities can be exploited to target secure systems. We developed a theoretical attack to the RSA signature algorithm, and we realized it in practice against an FPGA implementation of the system under attack. To perpetrate the attack, we inject transient faults in the target machine by regulating the voltage supply of the system. Thus, our attack does not require access to the victim system's internal components, but simply proximity to it. The paper makes three important contributions: first, we develop a systematic fault-based attack on the modular exponentiation algorithm for RSA. Second, we expose and exploit a severe flaw on the implementation of the RSA signature algorithm on OpenSSL, a widely used package for SSL encryption and authentication. Third, we report on the first physical demonstration of a fault-based security attack of a complete microprocessor system running unmodified production software: we attack the original OpenSSL authentication library running on a SPARC Linux system implemented on FPGA, and extract the system's 1024-bit RSA private key in approximately 100 hours.
机译:为了使任何计算系统都安全,必须同时信任硬件和软件。如果安全系统中的硬件层受到破坏,则不仅可以提取有关软件的秘密信息,而且对于软件来说,检测到正在发生的攻击将非常困难。在这项工作中,我们详细介绍了微处理器系统上完整的端到端故障攻击,并实际演示了如何利用硬件漏洞来锁定安全系统。我们对RSA签名算法进行了理论上的攻击,并在实践中针对受攻击系统的FPGA实现实现了它。为了进行攻击,我们通过调节系统的电源电压将瞬态故障注入目标机器。因此,我们的攻击不需要访问受害者系统的内部组件,而只需接近它即可。本文做出了三个重要贡献:首先,我们针对RSA的模块化指数算法开发了一种基于故障的系统攻击。其次,我们暴露并利用在OpenSSL(广泛用于SSL加密和身份验证的程序包)上执行RSA签名算法的严重缺陷。第三,我们报告了运行未经修改的生产软件的完整微处理器系统的基于故障的安全攻击的首次物理演示:我们攻击在FPGA上实现的SPARC Linux系统上运行的原始OpenSSL身份验证库,并提取系统的1024位RSA私钥大约需要100个小时。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号