首页> 外文会议>Topics in cryptology - CT-RSA 2007 >Predicting Secret Keys Via Branch Prediction
【24h】

Predicting Secret Keys Via Branch Prediction

机译:通过分支预测来预测秘密密钥

获取原文
获取原文并翻译 | 示例

摘要

This paper announces a new software side-channel attack -enabled by the branch prediction capability common to all modern high-performance CPUs. The penalty paid (extra clock cycles) for a mispredicted branch can be used for cryptanalysis of cryptographic primitives that employ a data-dependent program flow. Analogous to the recently described cache-based side-channel attacks our attacks also allow an unprivileged process to attack other processes running in parallel on the same processor, despite sophisticated partitioning methods such as memory protection, sandboxing or even virtualization. In this paper, we will discuss several such attacks for the example of RSA, and experimentally show their applicability to real systems, such as OpenSSL and Linux. Moreover, we will also demonstrate the strength of the branch prediction side-channel attack by rendering the obvious countermeasure in this context (Montgomery Multiplication with dummy-reduction) as useless. Although the deeper consequences of the latter result make the task of writing an efficient and secure modular exponentiation (or scalar multiplication on an elliptic curve) a challenging task, we will eventually suggest some counter-measures to mitigate branch prediction side-channel attacks.
机译:本文宣布了一种新的软件侧信道攻击,该攻击由所有现代高性能CPU共有的分支预测功能启用。为错误预测的分支付出的代价(额外的时钟周期)可用于采用数据相关程序流的密码原语的密码分析。与最近描述的基于缓存的边信道攻击类似,尽管有复杂的分区方法(例如内存保护,沙箱甚至虚拟化),我们的攻击也允许无特权的进程攻击在同一处理器上并行运行的其他进程。在本文中,我们将以RSA为例讨论几种此类攻击,并通过实验证明其对真实系统(如OpenSSL和Linux)的适用性。此外,我们还将通过在这种情况下将明显的对策(带假人减少的蒙哥马利乘法)视为无用的方法来证明分支预测侧信道攻击的强度。尽管后一结果的更深层后果使编写高效且安全的模幂(或椭圆曲线上的标量乘法)的任务成为一项具有挑战性的任务,但我们最终还是会提出一些缓解对策,以缓解分支预测侧信道攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号