Skip to main content
Erschienen in: Journal of Cryptographic Engineering 4/2017

09.05.2017 | Special Section on Proofs 2016

Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers

verfasst von: Sarani Bhattacharya, Debdeep Mukhopadhyay

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 4/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Implementations of asymmetric key algorithm have been threatened via timing side channels due to the behavior of the underlying branch predictors. However, the effect of faults on such predictors and the consequences thereof on the security of crypto-algorithms have not been studied. Motivated by the fact that unknown branch predictors of standard processors bear a strong correlation with 2-bit dynamic predictors, this paper develops a formal analysis of such a bimodal predictor under the effect of faults. Assuming a popular bit-flip fault model, the analysis shows that differences of branch misses under the effect of such faults can be exploited to attack implementations of RSA-like asymmetric key algorithms, based on square and multiplication operations. Furthermore, these attacks can be also threatening against Montgomery ladder of CRT-RSA (RSA implemented using Chinese Remainder Theorem) and even against fault attack countermeasures which stop or randomize the output in case of a fault. The theoretical claims have been substantiated by detailed fault simulations, where the difference of branch misses has been observed using the “perf” tool in Linux.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
We explain the upper bound of 3 at the end of this section. The lower bound can be similarly established.
 
Literatur
1.
Zurück zum Zitat Aciiçmez, O., Koç, Ç.K., Seifert, J.-P.: On the power of simple branch prediction analysis. IACR Cryptol. ePr. Arch. 2006, 351 (2006) Aciiçmez, O., Koç, Ç.K., Seifert, J.-P.: On the power of simple branch prediction analysis. IACR Cryptol. ePr. Arch. 2006, 351 (2006)
2.
Zurück zum Zitat Aciiçmez, O., Koç, Ç.K., Seifert, J.-P.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA, Volume 4377 of Lecture Notes in Computer Science, pp. 225–242. Springer, Berlin (2007) Aciiçmez, O., Koç, Ç.K., Seifert, J.-P.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA, Volume 4377 of Lecture Notes in Computer Science, pp. 225–242. Springer, Berlin (2007)
3.
Zurück zum Zitat Aciiçmez, O., Gueron, S., Seifert, J-P.: New branch prediction vulnerabilities in openssl and necessary software countermeasures. In: Cryptography and Coding, 11th IMA International Conference 2007, Proceedings, pp. 185–203. (2007) Aciiçmez, O., Gueron, S., Seifert, J-P.: New branch prediction vulnerabilities in openssl and necessary software countermeasures. In: Cryptography and Coding, 11th IMA International Conference 2007, Proceedings, pp. 185–203. (2007)
5.
Zurück zum Zitat Bhattacharya, S., Mukhopadhyay, D.: Curious case of rowhammer: flipping secret exponent bits using timing analysis. In: Gierlichs, B., Poschmann, A. (eds.) Cryptographic hardware and embedded systems – CHES 2016. CHES 2016. Lecture notes in Computer Science, vol. 9813, pp. 602–624. Springer, Berlin, Heidelberg (2016) Bhattacharya, S., Mukhopadhyay, D.: Curious case of rowhammer: flipping secret exponent bits using timing analysis. In: Gierlichs, B., Poschmann, A. (eds.) Cryptographic hardware and embedded systems – CHES 2016. CHES 2016. Lecture notes in Computer Science, vol. 9813, pp. 602–624. Springer, Berlin, Heidelberg (2016)
6.
Zurück zum Zitat Bhattacharya, S., Mukhopadhyay, D.: Who watches the watchmen?: utilizing performance monitors for compromising keys of RSA on Intel platforms. In: Güneysu, T., Handschuh, H. (eds.) Cryptographic Hardware and Embedded Systems – CHES 2015. CHES 2015. Lecture Notes in Computer Science, vol. 9293, pp. 248–266. Springer, Berlin, Heidelberg (2015) Bhattacharya, S., Mukhopadhyay, D.: Who watches the watchmen?: utilizing performance monitors for compromising keys of RSA on Intel platforms. In: Güneysu, T., Handschuh, H. (eds.) Cryptographic Hardware and Embedded Systems – CHES 2015. CHES 2015. Lecture Notes in Computer Science, vol. 9293, pp. 248–266. Springer, Berlin, Heidelberg (2015)
7.
Zurück zum Zitat Bhattacharya, S., Rebeiro, C., Mukhopadhyay, D.: Hardware prefetchers leak: a revisit of svf for cache-timing attacks. In: MICRO Workshops, pp. 17–23. IEEE Computer Society (2012) Bhattacharya, S., Rebeiro, C., Mukhopadhyay, D.: Hardware prefetchers leak: a revisit of svf for cache-timing attacks. In: MICRO Workshops, pp. 17–23. IEEE Computer Society (2012)
8.
Zurück zum Zitat Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (eds.) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture notes in Computer Science, vol. 1233, pp. 37–51. Springer, Berlin, Heidelberg (1997) Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (eds.) Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture notes in Computer Science, vol. 1233, pp. 37–51. Springer, Berlin, Heidelberg (1997)
9.
Zurück zum Zitat Fog, A.: The microarchitecture of Intel, AMD and VIA CPUs/An optimization guide for assembly programmers and compiler makers (2012) Fog, A.: The microarchitecture of Intel, AMD and VIA CPUs/An optimization guide for assembly programmers and compiler makers (2012)
10.
Zurück zum Zitat Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Koç, Ç.K., Paar, C. (eds.) CHES, Volume 2523 of Lecture Notes in Computer Science, pp. 291–302. Springer, Berlin (2002) Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Koç, Ç.K., Paar, C. (eds.) CHES, Volume 2523 of Lecture Notes in Computer Science, pp. 291–302. Springer, Berlin (2002)
11.
Zurück zum Zitat Kim, C.H., Quisquater, J-J.: Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, JJ. (eds.) Information security theory and practices. Smart cards, mobile and ubiquitous computing systems. WISTP 2007. Lecture notes in Computer Science, vol. 4462, pp. 215–228. Springer, Berlin, Heidelberg (2007) Kim, C.H., Quisquater, J-J.: Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, JJ. (eds.) Information security theory and practices. Smart cards, mobile and ubiquitous computing systems. WISTP 2007. Lecture notes in Computer Science, vol. 4462, pp. 215–228. Springer, Berlin, Heidelberg (2007)
12.
Zurück zum Zitat Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J-H., Lee, D., Wilkerson, C., Lai, K., Mutlu, O.: Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors. In: ACM/IEEE 41st International Symposium on Computer Architecture, ISCA 2014, 14–18 June 2014, pp. 361–372. IEEE Computer Society, Minneapolis (2014) Kim, Y., Daly, R., Kim, J., Fallin, C., Lee, J-H., Lee, D., Wilkerson, C., Lai, K., Mutlu, O.: Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors. In: ACM/IEEE 41st International Symposium on Computer Architecture, ISCA 2014, 14–18 June 2014, pp. 361–372. IEEE Computer Society, Minneapolis (2014)
13.
Zurück zum Zitat Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO ’96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp. 104–113. Springer, London (1996) Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: CRYPTO ’96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, pp. 104–113. Springer, London (1996)
14.
Zurück zum Zitat Maitra, S., Sarkar, S.: On deterministic polynomial-time equivalence of computing the CRT-RSA secret keys and factoring. IACR Cryptol. ePr. Arch. 2009, 62 (2009) Maitra, S., Sarkar, S.: On deterministic polynomial-time equivalence of computing the CRT-RSA secret keys and factoring. IACR Cryptol. ePr. Arch. 2009, 62 (2009)
16.
Zurück zum Zitat Patranabis, S., Chakraborty, A., Mukhopadhyay, D.: Fault tolerant infective countermeasure for AES. In: Security, Privacy, and Applied Cryptography Engineering–5th International Conference, SPACE 2015, Jaipur, India, October 3–7, 2015, pp. 190–209 (2015) Patranabis, S., Chakraborty, A., Mukhopadhyay, D.: Fault tolerant infective countermeasure for AES. In: Security, Privacy, and Applied Cryptography Engineering–5th International Conference, SPACE 2015, Jaipur, India, October 3–7, 2015, pp. 190–209 (2015)
17.
Zurück zum Zitat Rebeiro, C., Mukhopadhyay, D.: A formal analysis of prefetching in profiled cache-timing attacks on block ciphers. IACR Cryptol. ePr. Arch. 2015, 1191 (2015) Rebeiro, C., Mukhopadhyay, D.: A formal analysis of prefetching in profiled cache-timing attacks on block ciphers. IACR Cryptol. ePr. Arch. 2015, 1191 (2015)
20.
Zurück zum Zitat Weaver, V.M., University of Maine.: Linux perf_event features and overhead. In: 2013 FastPath Workshop (2013) Weaver, V.M., University of Maine.: Linux perf_event features and overhead. In: 2013 FastPath Workshop (2013)
Metadaten
Titel
Formal fault analysis of branch predictors: attacking countermeasures of asymmetric key ciphers
verfasst von
Sarani Bhattacharya
Debdeep Mukhopadhyay
Publikationsdatum
09.05.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 4/2017
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-017-0165-6

Weitere Artikel der Ausgabe 4/2017

Journal of Cryptographic Engineering 4/2017 Zur Ausgabe

Special Section on Proofs 2016

Template attack versus Bayes classifier