New Cryptographic Protocols With Side-Channel Attack Security
نویسنده
چکیده
Acknowledgments This thesis is based on joint work with Professor Mihir Bellare and David Cash. I'd like to express gratitude for the time that we explored ideas together; you were wonderful to work with! A very special thank you to my Advisor, Professor Shafi Goldwasser, for such caring mentorship – it has been such a pleasure to work and to learn under you for my time at MIT. Finally, I'd like to thank my family and my friends for their awesome, incredible support. 4 1 Introduction Historical notions of cryptographic security have assumed that adversaries have only black box access to cryptographic primitives; in these security games, adversaries can observe input and output behavior of the protocol, but gain no information from the physical implementation. However, this model fails to account for the fact that adversaries do gain additional information from physical implementations: such implementations leak data, such as the time or power it takes to compute with a secret key, and are also susceptible to physical tampering attacks, such as modification of the secret key with microprobes. Attacks that take advantage of this non-black-box nature of protocols are collectively known as side channel attacks. Side channel attacks actually exist in practice-many practical side channel attacks have been well documented for almost two decades. To model the adversarial powers that allow side channel attacks, theoretical cryptographers have developed the enhanced security models of leakage and tampering. Leakage accounts for information passive adversaries may gain about the contents of secret memory in addition to the input/output behavior of the system. Tampering accounts for adversarial modification of an executing protocol, including changes to the bits in secret memory, the introduction of errors to the computation, and even physical changes to the circuit executing the protocol. Theoretical works have studied leakage extensively over the last several years, especially in the context of signatures and encryption. In contrast, very few theoretical results address tampering attacks– efficient cryptographic primitives with robust security against tampering are still lacking. Though several constructions of higher level primitives exist, these constructions only protect against highly algebraic and scheme specific tampering attacks [GOR11, AHI11, Luc04, BC10, GL10], or else require heavy and inefficient machinery, such as NIZK proofs[KKS11]. The most commonly used theoretical framework in tampering is the Related-Key Attack (RKA) model, which allows adversarial modification of the secret key. In a related key attack, the adversary is allowed to …
منابع مشابه
Authentication Using Side-Channel Information
Authentication based on cryptographic protocols is a key technology for recent security systems. However, the so-called relay attack where a malicious attacker tries to assume the role of the prover, is known to be a serious threat even for the cryptographically-secure authentication systems. This paper proposes a new authentication method that utilizes the side channel that already exists in m...
متن کاملFault Attack, Countermeasures on Pairing Based Cryptography
Bilinear pairing is a new and increasingly popular way of constructing cryptographic protocols. This has resulted in the development of Identity Based Encryption (IBE) that is ideally used in identity aware devices. The security of such devices using pairing algorithms against side-channel and fault attack has not been studied extensively. This paper examines the security of existing countermea...
متن کاملFault Attack and Countermeasures on Pairing Based Cryptography
Bilinear pairing is a new and increasingly popular way of constructing cryptographic protocols. This has resulted in the development of Identity Based Encryption (IBE) that is ideally used in identity aware devices. The security of such devices using pairing algorithms against side-channel and fault attack has not been studied extensively. This paper examines the security of existing countermea...
متن کاملA Salient Missing Link in RFID Security Protocols
In side channel analysis, an attacker utilizes some legitimate function queries in order to collect the corresponding responses of a cryptographic system while it is functioning in a normal mode. If those responses reveal some unwanted information about the secrecy or privacy, this leakage is called side channel information and these responses are called side channels. In this respect, careless...
متن کاملA Novel Substitution Box Design for humming Bird-2 against Side channel Attack
The side-channel attacks are one of the effortless and commanding attacks against cryptographic implementation and their intention vary from protocols, modules, primitives and system. As a result of this attack, a serious threat to the security of cryptographic module was encountered. In effect, realization of the cryptographic algorithm has to take some countermeasure to resist against this ty...
متن کاملTemplate attacks exploiting static power and application to CMOS lightweight crypto-hardware
Side-channel attacks are a serious threat to security-critical software. OpenSSL is a prime security attack target due to the library’s ubiquitous real world applications, therefore, the history of cache-timing attacks against OpenSSL is varied and rich. The presentation includes a brief history of cache-timing attacks in OpenSSL. To mitigate remote timing and cache-timing attacks, many ubiquit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012