Rational Protection Against Timing Attacks

被引:7
作者
Doychev, Goran [1 ]
Kopf, Boris [1 ]
机构
[1] IMDEA Software Inst, Madrid, Spain
来源
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015 | 2015年
关键词
LEAKAGE;
D O I
10.1109/CSF.2015.39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Timing attacks can effectively recover keys from cryptosystems. While they can be defeated using constant-time implementations, this defensive approach comes at the price of a performance penalty. One is hence faced with the problem of striking a balance between performance and security against timing attacks. In this paper, we propose a systematic approach for determining the optimal protection against timing attacks, on the example of cryptosystems based on discrete logarithms. Our model includes a resource-bounded timing adversary who strives to maximize the probability of key recovery, and a defender who strives to reduce the cost while maintaining a certain degree of security. We obtain the optimal protection as an equilibrium in a game between the defender and the adversary. At the heart of the equilibrium computation are novel bounds for the probability of key recovery, which are expressed as a function of the applied protection and the attack strategy of a timing adversary. We put our techniques to work in a case study in which we identify optimal protections for libgcrypt's EIGamal implementation. We determine situations in which the optimal choice is to use a defensive, constant-time implementation and a small key, and situations in which the optimal choice is a more aggressively tuned (but leaky) implementation with a longer key.
引用
收藏
页码:526 / 536
页数:11
相关论文
共 36 条
  • [1] Aggarwal D, 2011, LECT NOTES COMPUT SC, V7073, P686, DOI 10.1007/978-3-642-25385-0_37
  • [2] Measuring Information Leakage using Generalized Gain Functions
    Alvim, Mario S.
    Chatzikokolakis, Kostas
    Palamidessi, Catuscia
    Smith, Geoffrey
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 265 - 279
  • [3] [Anonymous], 2011, ECRYPT 2 YEARLY REPO
  • [4] Belaid S., 2014, IACR CRYPTOLOGY EPRI, V2014, P53
  • [5] Bhattacharya Sayan, 2011, Internet and Network Economics. Proceedings 7th International Workshop, WINE 2011, P13, DOI 10.1007/978-3-642-25510-6_2
  • [6] Blocki J., 2013, Proceedings of the Twenty-Third international joint conference on Artificial Intelligence, P41
  • [7] Boreale M., 2012, 2012 Ninth International Conference on Quantitative Evaluation of Systems (QEST 2012), P158, DOI 10.1109/QEST.2012.31
  • [8] Boreale M, 2011, LECT NOTES COMPUT SC, V6604, P396, DOI 10.1007/978-3-642-19805-2_27
  • [9] Constant time modular inversion
    Bos, Joppe W.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (04) : 275 - 281
  • [10] Remote timing attacks are practical
    Brumley, D
    Boneh, D
    [J]. COMPUTER NETWORKS, 2005, 48 (05) : 701 - 716