Title: sidechannel attack pitfalls
1(No Transcript)
2Side-Channel Attack Pitfalls
3Side-Channels
- Information leakage from implementation
- Example safecracker feels tumblers
impactingand opens lock without trying each
combination - Similarly hacker observes time/power and cracks
cipher without trying each key - Device in normal operation, no physical harm
- Covert channel without conspiracy/consent
4Side-Channel Attacks in a Nutshell
e.g. estimated power number of changing
bitscan be lousy model
AES 128-bit secret keybrute force impossible
P S-1(KG?C) E HmW(P)
compare both and choose key guess with best
match
e.g. guess 8 bitsbrute force easy
5Power Analysis Example
- Unprotected ASIC AESwith 128-bit datapath, key
scheduling - Measurement Ipeak in round 11
- Estimation HamDistance of 8 internal bits
- Comparison correlation
- Key bits easily found despite algorithmic noise
- 128-bit key under 3 min.
start encryption-signal
clock cycle of interest
supply current
6 New Design Dimension
- Mitigations conflict with common design goals
- Resistance analysis, precise mitigation cost not
always well understood - Design trade-offs difficult to make
power
performance
area
side-channelmitigation
7Side-Channel Pitfalls
- Resource sharing
- Reduces HW to implement certain functionality
- Results in interaction and competition
- Create facilitate observation side-channel info
- Optimization features
- Improves a systems performance/cost
- Typical case optimized, corner case leaks info
- Create side-channel info
- Increased visibility/functionality
- Provides more information or introduces new
interactions - Facilitate observation side-channel info
8Example using Cache Attacks
- Resource sharing
- Cache accesses observed by spy process evicting
cached data of crypto - Optimization features
- Cache implemented to overcome latency penalty
- Increased visibility
- Performance counters provide accurate picture
CPU
Fast
Slow
MEMORY
CACHE
9Side-Channel Classification
- Simple attacks
- e.g. textbook square-and-multiply RSA algorithm
- Number of measurements, not simplicity attack
- Requires precise knowledge of implementation and
effect on measurement sample - Relatively easy to protect from
- Differential attacks
- Many observations
- Statistical techniques
- Leakage channel
- Timing, power / EMA
10Mitigation Strategies
- Timing attacks
- Typically target variable instruction flow? main
focus on public key ciphers - Exponent and base blinding prevent multiple
measurements of same operation on different data - Power Attacks / EMA
- Typically target data dependent power
variations? main focus on symmetric key ciphers - Randomize / equalize power consumption to
increase the number of measurements
11Main Challenge Power Analysis
- Randomize (? noise!)
- Decorrelate power from state signalstate?mask
- Algorithmic masking, logic level
- Problems glitches, early propagation, higher
order attack, templates - Equalize
- Same power for every transition
- Dual rail precharge logic
- Problems early propagation, capacitance mismatch
12Equalizing Mitigation Example
- Same experiment
- Automated design flow
- WDDL single switching event per clock cycle
- Differential routingconstant load capacitance
- Security is not for free
start encryption-signal
supply current
13Opportunities (Pitfalls?) for Research
- Mitigations do not come cheap
- Randomization factor 1.5
- Equalization factor 3
- (Mitigations)2 push envelop
- Improvements partitioning, custom logic
- Optimize current state-of-the-art, develop
breakthrough mitigation? - Communicate full cost
- e.g. mask distribution, random mask generator
14New Mitigations?
- Visual inspection, standard deviation no figure
of merit for mitigation strength - Easily distinguish quality of implementation from
adversary strength? - Expression based on design parameters (activity
factor, power profile, etc)?
15Design Time Resistance Assessment
- Resistance cannot be added as afterthought
- Few automatic design flows proposed
- Quality only as good as power simulation
- Glitches, early propagation enable attacks
- Control arrival times on 20K signals?
- Proper simulation model to correctly (yet
quickly) evaluate design? - Minor differences have a big influence
- Process variations in deep submicron technology?
16Balanced Interconnect capacitances
- Crucial for ALL dual rail circuit mitigations to
succeed - e.g. differential routing
- Cross-coupling?
- Process variations in deep submicron technology?
17Conclusions
- Mathematical complexity circumvented with
information leaking from HW/SW - Pitfalls that create, facilitate observation
- Mitigations generally challenging and costly
- Opportunities for future research