首页> 外文会议>3rd international conference on theory and practice of electronic governance 2009 >Satisfiability-based framework for enabling side-channel attacks on cryptographic software
【24h】

Satisfiability-based framework for enabling side-channel attacks on cryptographic software

机译:基于可满足性的框架,用于对加密软件进行边信道攻击

获取原文

摘要

Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their theoretical strength, can be broken through weaknesses in their implementation. In particular, side-channel attacks, which exploit unintended information leakage from the implementation, have been established as a powerful way of attacking cryptographic systems. All side-channel attacks can be viewed as consisting of two phases --- an observation phase, wherein information is gathered from the target system, and an analysis or deduction phase in which the collected information is used to infer the cryptographic key. Thus far, most side-channel attacks have focused on extracting information that directly reveals the key, or variables from which the key can be easily deduced.We propose a new framework for performing side-channel attacks by formulating the analysis phase as a search problem that can be solved using modern Boolean analysis techniques such as satisfiability solvers. This approach can substantially enhance the scope of side-channel attacks by allowing a potentially wide range of internal variables to be exploited (not just those that are "simply" related to the key). For example, software implementations take great care in protecting secret keys through the use of on-chip key generation and storage. However, they may inadvertently expose the values of intermediate variables in their computations. We demonstrate how to perform side-channel attacks on software implementations of cryptographic algorithms based on the use of a satisfiability solver for reasoning about the secret keys from the values of the exposed variables. Our attack technique is automated, and does not require mathematical expertise on the part of the attacker. We demonstrate the merit of the proposed technique by successfully applying it to two popular cryptographic algorithms, DES and 3DES.
机译:为了提供安全性,许多电子系统都包含密码算法的实现。众所周知,密码算法,无论其理论强度如何,都可以通过其实现中的弱点来打破。尤其是,侧信道攻击已被利用,这种侧信道攻击利用了实现中的意外信息泄漏,是攻击密码系统的有效方法。可以将所有侧信道攻击视为由两个阶段组成-观察阶段(其中从目标系统收集信息)和分析或推断阶段(其中使用收集的信息来推断密码密钥)。到目前为止,大多数旁通道攻击都集中在提取直接揭示密钥或可以轻易推导出密钥的变量的信息上。我们提出了一种新的框架,通过将分析阶段表述为搜索问题来进行侧通道攻击可以使用现代布尔分析技术(例如可满足性求解器)来解决。通过允许潜在地利用范围广泛的内部变量(而不仅仅是与密钥“简单”相关的那些内部变量),该方法可以大大增强侧信道攻击的范围。例如,软件实现非常注意通过使用片上密钥生成和存储来保护秘密密钥。但是,它们可能在计算中无意间暴露了中间变量的值。我们演示了如何基于可满足性求解器对加密算法的软件实现进行边信道攻击,从而根据暴露变量的值对秘密密钥进行推理。我们的攻击技术是自动化的,不需要攻击者具备数学专业知识。通过将其成功应用于两种流行的密码算法DES和3DES,我们证明了所提出技术的优点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号