首页> 外文OA文献 >Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging
【2h】

Side-Channel Analysis: Countermeasures and Application to Embedded Systems Debugging

机译:边通道分析:对策及在嵌入式系统调试中的应用

摘要

Side-Channel Analysis plays an important role in cryptology, asit represents an important class of attacks against cryptographicimplementations, especially in the context of embedded systemssuch as hand-held mobile devices, smart cards, RFID tags, etc.These types of attacks bypass any intrinsic mathematical securityof the cryptographic algorithm or protocol by exploiting observableside-effects of the execution of the cryptographic operation thatmay exhibit some relationship with the internal (secret) parametersin the device. Two of the main types of side-channel attacks aretiming attacks or timing analysis, where the relationship betweenthe execution time and secret parameters is exploited; and poweranalysis, which exploits the relationship between power consumptionand the operations being executed by a processor as well as thedata that these operations work with. For power analysis, twomain types have been proposed: simple power analysis (SPA) whichrelies on direct observation on a single measurement, anddifferential power analysis (DPA), which uses multiplemeasurements combined with statistical processing to extractinformation from the small variations in power consumptioncorrelated to the data.In this thesis, we propose several countermeasures to thesetypes of attacks, with the main themes being timing analysisand SPA. In addition to these themes, one of our contributionsexpands upon the ideas behind SPA to present a constructiveuse of these techniques in the context of embedded systemsdebugging.In our first contribution, we present a countermeasure againsttiming attacks where an optimized form of idle-wait is proposedwith the goal of making the observable decryption time constantfor most operations while maintaining the overhead to a minimum.We show that not only we reduce the overhead in terms of executionspeed, but also the computational cost of the countermeasure,which represents a considerable advantage in the context ofdevices relying on battery power, where reduced computationstranslates into lower power consumption and thus increasedbattery life. This is indeed one of the important themes forall of the contributions related to countermeasures to side-channel attacks.Our second and third contributions focus on power analysis;specifically, SPA. We address the issue of straightforwardimplementations of binary exponentiation algorithms (or scalarmultiplication, in the context of elliptic curve cryptography)making a cryptographic system vulnerable to SPA. Solutionspreviously proposed introduce a considerable performancepenalty. We propose a new method, namely Square-and-Buffered-Multiplications (SABM), that implements an SPA-resistant binaryexponentiation exhibiting optimal execution time at the cost ofa small amount of storage --- O(sqrt(ell)), where ell is thebit length of the exponent. The technique is optimal in thesense that it adds SPA-resistance to an underlying binaryexponentiation algorithm while introducing zero computationaloverhead.We then present several new SPA-resistant algorithms that resultfrom a novel way of combining the SABM method with an alternativebinary exponentiation algorithm where the exponent is split intwo halves for simultaneous processing, showing that by combiningthe two techniques, we can make use of signed-digit representationsof the exponent to further improve performance while maintainingSPA-resistance. We also discuss the possibility of our methodbeing implemented in a way that a certain level of resistanceagainst DPA may be obtained.In a related contribution, we extend these ideas used in SPA andpropose a technique to non-intrusively monitor a device and traceprogram execution, with the intended application of assisting inthe difficult task of debugging embedded systems at deploymentor production stage, when standard debugging tools or auxiliarycomponents to facilitate debugging are no longer enabled in thedevice. One of the important highlights of this contribution isthe fact that the system works on a standard PC, capturing thepower traces through the recording input of the sound card.
机译:旁通道分析在密码学中起着重要作用,因为它代表了针对密码实现的一类重要攻击,尤其是在嵌入式系统(如手持移动设备,智能卡,RFID标签等)的环境中,这些类型的攻击绕过了任何内在因素通过利用执行加密操作的可观察到的副作用来显示密码算法或协议的数学安全性,这些副作用可能与设备中的内部(秘密)参数有关。侧信道攻击的两种主要类型是定时攻击或时序分析,其中利用了执行时间和秘密参数之间的关系。以及功耗分析,它利用了功耗与处理器正在执行的操作之间的关系以及这些操作所使用的数据。对于功率分析,已经提出了两种主要类型:简单功率分析(SPA)(依赖于单个测量的直接观察)和差分功率分析(DPA),它使用多种测量与统计处理相结合,以从与功耗相关的微小功耗变化中提取信息。本文针对这些类型的攻击提出了几种对策,其主要主题是定时分析和SPA。除了这些主题之外,我们的其中一项贡献是扩展了SPA背后的思想,以在嵌入式系统调试的背景下提出这些技术的建设性使用。在我们的第一篇贡献中,我们提出了一种针对定时攻击的对策,其中提出了一种优化的空闲等待形式,我们的目标是使大多数操作的可观察解密时间保持恒定,同时将开销保持在最低水平。我们证明,不仅在执行速度方面减少了开销,而且还降低了对策的计算成本,这在上下文中具有相当大的优势。的设备依赖电池电量,减少的计算量转化为较低的功耗,从而延长了电池寿命。这确实是与对边信道攻击的对策有关的所有贡献的重要主题之一。我们的第二和第三贡献着重于功率分析;特别是SPA。我们解决了二进制求幂算法(在椭圆曲线密码学的背景下为标量乘法)的直接实现问题,使密码系统易受SPA攻击。先前提出的解决方案引入了相当大的性能损失。我们提出了一种新的方法,即平方和缓冲乘法(SABM),该方法实现SPA抵抗的二进制幂运算,并以少量存储为代价展现了最佳执行时间--- O( sqrt( ell)),其中 ell是指数的位长。这项技术是最佳的,因为它将SPA抵抗力添加到底层二进制乘幂算法,同时引入了零计算开销。然后,我们提出了几种新的SPA抵抗算法,这些算法是通过将SABM方法与替代指数乘幂算法相结合的新方法得到的,其中指数为分为两半进行同时处理,这表明通过结合这两种技术,我们可以利用指数的带符号的数字表示形式来进一步提高性能,同时保持SPA抵抗力。我们还讨论了以实现对DPA一定程度的抵抗力的方式实施我们的方法的可能性。在相关的贡献中,我们扩展了SPA中使用的这些思想,并提出了一种技术来非侵入性地监视设备和跟踪程序执行,当设备中不再启用用于调试的标准调试工具或辅助组件时,用于在部署或生产阶段调试嵌入式系统的艰巨任务的预期应用。该贡献的重要亮点之一是该系统可在标准PC上运行,并通过声卡的记录输入捕获电源迹线。

著录项

  • 作者

    Moreno Carlos;

  • 作者单位
  • 年度 2013
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号