首页> 外文会议>IEEE European Symposium on Security and Privacy >Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
【24h】

Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL

机译:openssl中椭圆曲线参数的退化故障攻击

获取原文

摘要

In this paper, we describe several practically exploitable fault attacks against OpenSSL's implementation of elliptic curve cryptography, related to the singular curve point decompression attacks of Bl?mer and Günther (FDTC2015) and the degenerate curve attacks of Neves and Tibouchi (PKC 2016). In particular, we show that OpenSSL allows to construct EC key files containing explicit curve parameters with a compressed base point. A simple single fault injection upon loading such a file yields a full key recovery attack when the key file is used for signing with ECDSA, and a complete recovery of the plaintext when the file is used for encryption using an algorithm like ECIES. The attack is especially devastating against curves with j-invariant equal to 0 such as the Bitcoin curve secp256k1, for which key recovery reduces to a single division in the base field. Additionally, we apply the present fault attack technique to OpenSSL's implementation of ECDH, by combining it with Neves and Tibouchi's degenerate curve attack. This version of the attack applies to usual named curve parameters with nonzero j-invariant, such as P192 and P256. Although it is typically more computationally expensive than the one against signatures and encryption, and requires multiple faulty outputs from the server, it can recover the entire static secret key of the server even in the presence of point validation. These various attacks can be mounted with only a single instruction skipping fault, and therefore can be easily injected using low-cost voltage glitches on embedded devices. We validated them in practice using concrete fault injection experiments on a Rapsberry Pi single board computer running the up to date OpenSSL command line tools—a setting where the threat of fault attacks is quite significant.
机译:在本文中,我们将介绍针对OpenSSL的实现椭圆曲线密码体制,涉及到BL'聚体和半滑舌鳎(FDTC2015)的奇异曲线点减压攻击和内维斯和Tibouchi(PKC 2016)的堕落曲线攻击,有几个实际利用的故障攻击。特别是,我们表明,OpenSSL的允许构建含有与压缩基点明确的曲线参数EC密钥文件。在加载这样的文件是一个单一的故障注入产生当密钥文件用于与ECDSA签署全面密钥恢复攻击,并在文件中使用像ECIES的算法用于加密的明文的完全恢复。攻击尤其毁灭性针对与J-不变曲线等于0,如比特币曲线secp256k1,为此,密钥恢复降低了在基字段的单个分部。此外,我们应用本故障攻击技术,OpenSSL的实现ECDH的,通过与内维斯和Tibouchi的堕落曲线攻击组合。这种攻击的版本适用于通常的命名曲线参数具有非零J-不变的,如P192和P256。虽然这是典型的计算量比对签名和加密的一个昂贵的,并且需要从服务器的多个故障输出,它甚至可以在点确认存在恢复服务器的整个静态密钥。这些各种攻击可以安装仅与单个指令跳过故障,并且因此可以使用在嵌入式设备上的低成本的电压毛刺容易注入。我们使用运行最新的OpenSSL的命令行工具,设置在那里的故障攻击的威胁是相当显著一个Rapsberry丕单板计算机上的具体故障注入实验,验证他们的做法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号