Aiding side-channel attacks on cryptographic software with satisfiability-based analysis

被引:14
|
作者
Potlapally, Nachiketh R. [1 ]
Raghunathan, Anand
Ravi, Srivaths
Jha, Niraj K.
Lee, Ruby B.
机构
[1] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
[2] NEC Labs Amer, Princeton, NJ 08540 USA
基金
欧盟地平线“2020”;
关键词
AES; cryptanalysis; DES; satisfiability; security; side-channel attacks; software; 3DES;
D O I
10.1109/TVLSI.2007.893665
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic algorithms,. irrespective of their theoretical strength, can be broken through weaknesses in their implementations. The most successful of these attacks are side-channel attacks which exploit unintended information leakage, e.g., timing information, power consumption, etc., from the implementation to extract the secret key. We propose a novel framework for implementing side-channel attacks where the attack is modeled as a search problem which takes the leaked information as its input, and deduces the secret key by using a satisfiability solver, a powerful Boolean reasoning technique. This approach can substantially enhance the scope of side-channel attacks by allowing a potentially wide range of internal variables to be exploited (not just those that are trivially related to the key). The proposed technique is particularly suited for attacking cryptographic software implementations which may inadvertently expose the values of intermediate variables in their computations (even though, they are very careful in protecting secret keys through the use of on-chip key generation and storage). We demonstrate our attack on standard software implementions of three popular cryptographic algorithms: DES, 3DES, and AES. Our attack technique is automated and does not require mathematical expertise on the part of the attacker.
引用
下载
收藏
页码:465 / 470
页数:6
相关论文
共 50 条
  • [21] Side-channel analysis attacks based on deep learning network
    Yu OU
    Lang LI
    Frontiers of Computer Science, 2022, 16 (02) : 37 - 47
  • [22] Side-channel analysis attacks based on deep learning network
    Yu Ou
    Lang Li
    Frontiers of Computer Science, 2022, 16
  • [23] Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9
    Zhang, Qi
    Wang, An
    Niu, Yongchuan
    Shang, Ning
    Xu, Rixin
    Zhang, Guoshuang
    Zhu, Liehuang
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [24] Side-channel analysis attacks based on deep learning network
    Ou, Yu
    Li, Lang
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (02)
  • [25] KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
    Schwarz, Michael
    Lipp, Moritz
    Gruss, Daniel
    Weiser, Samuel
    Maurice, Clementine
    Spreitzer, Raphael
    Mangard, Stefan
    25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [26] Design and Implementation of a Reconfigurable Cryptographic Coprocessor with Multiple Side-Channel Attacks Countermeasures
    Shang, Xinchao
    Shan, Weiwei
    Liu, Xinning
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (11)
  • [27] On-Board Decoupling of Cryptographic FPGA to Improve Tolerance to Side-Channel Attacks
    Iokibe, Kengo
    Amano, Tetsuo
    Toyota, Yoshitaka
    2011 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2011, : 925 - 930
  • [28] Survey on Software Side-channel Attacks in Trusted Execution Environment
    Yang F.
    Zhang Q.-Y.
    Shi Z.-P.
    Guan Y.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (01): : 381 - 403
  • [29] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [30] Side-Channel Attacks Based on Collaborative Learning
    Liu, Biao
    Ding, Zhao
    Pan, Yang
    Li, Jiali
    Feng, Huamin
    DATA SCIENCE, PT 1, 2017, 727 : 549 - 557