首页> 外文会议>Fault Diagnosis and Tolerance in Cryptography (FDTC 2009), 2009 >KeeLoq and Side-Channel Analysis-Evolution of an Attack
【24h】

KeeLoq and Side-Channel Analysis-Evolution of an Attack

机译:KeeLoq和侧通道分析-攻击的演变

获取原文

摘要

Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control purposes such as garage openers or car door systems. Even though the attack seems almost straightforward in hindsight, there where many practical and theoretical problems to overcome. In this talk I want to describe the evolution of the attack over about two years. Also, some possible future improvements using fault-injection will be mentioned. During the first phase of breaking KeeLoq, a surprisingly long time was spent on analyzing the target hardware, taking measurements and wondering why we did not succeed. In the second phase, we were able to use differential power analysis attacks successfully on numerous commercially available products employing KeeLoq code hopping. Our techniques allow for efficiently revealing both the secret key of a remote transmitter and the manufacturer key stored in a receiver. As a result, a remote control can be cloned from only ten power traces, allowing for a practical key recovery in a few minutes. With similar techniques but with considerably more measurements (typically on the order of 10,000) we can extract the manufacturer key which is stored in every receiver device, e.g., a garage door opener unit. In the third phase, and most recent phase, we were able to come up with several improvements. Most notably, we found that an SPA (simple power analysis) attack allows to recover the manufacturer key with one measurement. In the talk, we will also speculate about extensions to fault-injection and timing attacks. It is important to note that most of our findings are not specific to KeeLoq but are - in principle - applicable to any symmetric cipher with an implementation that is not sidechannel resistant.
机译:去年,我们能够破解KeeLoq,它是一种64位块密码,在远程无钥匙进入(RKE)系统中很流行。 KeeLoq RKE被广泛用于门禁控制,例如车库开启器或车门系统。尽管事后看来袭击几乎是直接的,但仍有许多实际和理论问题需要克服。在本次演讲中,我想描述攻击在过去两年中的演变。另外,将提及使用故障注入的一些将来可能的改进。在破解KeeLoq的第一阶段中,花费了令人惊讶的长时间来分析目标硬件,进行测量并想知道为什么我们没有成功。在第二阶段中,我们能够在众多采用KeeLoq跳码的商用产品上成功使用差分功率分析攻击。我们的技术可以有效地揭示远程发送器的秘密密钥和存储在接收器中的制造商密钥。结果,只能从十条电源线中克隆出一个遥控器,从而在几分钟之内就可以进行实际的密钥恢复。使用类似的技术,但要进行更多的测量(通常约为10,000个),我们可以提取制造商密钥,该密钥存储在每个接收器设备(例如,车库门开启器单元)中。在第三阶段(也是最新阶段),我们能够提出一些改进。最值得注意的是,我们发现SPA(简单功耗分析)攻击可以通过一次测量来恢复制造商密钥。在演讲中,我们还将推测有关故障注入和定时攻击的扩展。重要的是要注意,我们的大多数发现并非特定于KeeLoq,但原则上适用于任何对称加密算法,且其实现不具有抗旁通道性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号