Side-channel cryptographic attacks using pseudo-boolean optimization

被引:8
|
作者
Oren, Yossef [1 ]
Wool, Avishai [2 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, POB 653, IL-8410501 Beer Sheva, Israel
[2] Tel Aviv Univ, Sch Elect Engn, Cryptog & Network Secur Lab, IL-69978 Ramat Aviv, Israel
关键词
Cryptanalysis; Pseudo-boolean optimizers; Side-channel attacks; SAT SOLVERS; CRYPTANALYSIS; AES;
D O I
10.1007/s10601-015-9237-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Symmetric block ciphers, such as the Advanced Encryption Standard (AES), are deterministic algorithms which transform plaintexts to ciphertexts using a secret key. These ciphers are designed such that it is computationally very difficult to recover the secret key if only pairs of plaintexts and ciphertexts are provided to the attacker. Constraint solvers have recently been suggested as a way of recovering the secret keys of symmetric block ciphers. To carry out such an attack, the attacker provides the solver with a set of equations describing the mathematical relationship between a known plaintext and a known ciphertext, and then attempts to solve for the unknown secret key. This approach is known to be intractable against AES unless side-channel data - information leaked from the cryptographic device due to its internal physical structure - is introduced into the equation set. A significant challenge in writing equations representing side-channel data is measurement noise. In this work we show how casting the problem as a pseudo-Boolean optimization instance provides an efficient and effective way of tolerating this noise. We describe a theoretical analysis, connecting the measurement signal-to-noise ratio and the tolerable set size of a non-optimizing solver with the success probability. We then conduct an extensive performance evaluation, comparing two optimizing variants for dealing with measurement noise to a non-optimizing method. Our best optimizing method provides a successful attack on the AES cipher which requires surprisingly little side-channel data and works in reasonable computation time. We also make available a set of AES cryptanalysis instances and provide some practical feedback on our experience of using open-source constraint solvers.
引用
收藏
页码:616 / 645
页数:30
相关论文
共 50 条
  • [1] Side-channel cryptographic attacks using pseudo-boolean optimization
    Yossef Oren
    Avishai Wool
    Constraints, 2016, 21 : 616 - 645
  • [2] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [3] Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
    Potlapally, Nachiketh R.
    Raghunathan, Anand
    Ravi, Srivaths
    Jha, Niraj K.
    Lee, Ruby B.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2007, 15 (04) : 465 - 470
  • [4] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [5] Side-Channel Attacks Detection Methods: A Survey
    Assaeedi, Joanna
    Alsuwat, Hatim
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (06): : 288 - 296
  • [6] Cryptographic Coprocessor with Modular Architecture for Research and Development of Countermeasures Against Power-Based Side-Channel Attacks
    Korona, Mateusz
    Wojciechowski, Tomasz
    Rawski, Mariusz
    Tomaszewicz, Pawel
    PROCEEDINGS OF THE 2019 26TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2019), 2019, : 190 - 195
  • [7] Protecting Cryptographic Libraries Against Side-Channel and Code-Reuse Attacks
    Tsoupidi, Rodothea Myrsini
    Troubitsyna, Elena
    Papadimitratos, Panos
    IEEE SECURITY & PRIVACY, 2024, : 2 - 11
  • [8] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [9] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Mushtaq, Maria
    Yousaf, Muhammad Muneeb
    Bhatti, Muhammad Khurram
    Lapotre, Vianney
    Gogniat, Guy
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (11-12) : 731 - 747
  • [10] The Kingsguard OS-level mitigation against cache side-channel attacks using runtime detection
    Maria Mushtaq
    Muhammad Muneeb Yousaf
    Muhammad Khurram Bhatti
    Vianney Lapotre
    Guy Gogniat
    Annals of Telecommunications, 2022, 77 : 731 - 747