Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

被引:0
|
作者
Oswald, David [1 ]
Richter, Bastian [1 ]
Paar, Christof [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
Yubikey; side-channel analysis; one-time passwords; hardware token; implementation attack; embedded systems security; hardware vulnerabilities; POWER ANALYSIS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The classical way of authentication with a username-password pair is often insufficient: an adversary can choose from a multitude of methods to obtain the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous solutions incorporating a second factor in the authentication process have been proposed. A particularly wide-spread approach provides each user with a hardware token that generates a One-Time Password (OTP) in addition to the traditional credentials. The token itself comprises a secret cryptographic key that, together with timestamps and counters, is used to derive a fresh OTP for each authentication. A relatively new yet widespread example for an OTP token is the Yubikey 2 produced by Yubico. This device employs an open-source protocol based on the mathematically secure AES and emulates a USB keyboard to enter the OTP in a platform-independent manner. In this paper, we analyse the susceptibility of the Yubikey 2 to side-channel attacks. We show that by non-invasively measuring the power consumption and the electro-magnetic emanation of the device, an adversary is able to extract the full 128-bit AES key with approximately one hour of access to the Yubikey 2. The attack leaves no physical traces on the device and can be performed using low-cost equipment. In consequence, an adversary is able to generate valid OTPs, even after the Yubikey 2 has been returned to the owner.
引用
收藏
页码:204 / 222
页数:19
相关论文
共 50 条
  • [1] Using one-time passwords to prevent password phishing attacks
    Huang, Chun-Ying
    Ma, Shang-Pin
    Chen, Kuan-Ta
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1292 - 1301
  • [2] One-time password authentication protocol against theft attacks
    Tsuji, T
    Shimizu, A
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (03) : 523 - 529
  • [3] On one-time cookies protocol based on one-time password
    Junhui He
    Dezhi Han
    Kuan-Ching Li
    [J]. Soft Computing, 2020, 24 : 5657 - 5670
  • [4] On one-time cookies protocol based on one-time password
    He, Junhui
    Han, Dezhi
    Li, Kuan-Ching
    [J]. SOFT COMPUTING, 2020, 24 (08) : 5657 - 5670
  • [5] Thwarting Side-Channel Attacks
    Edwards, Chris
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [6] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [7] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [8] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    [J]. 2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [9] Attack and improvement on the one-time password authentication protocol against theft attacks
    Kuo, Wen-Chung
    Lee, Yung-Cheng
    [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 1918 - +
  • [10] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    [J]. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575