Investigation of Implementation Attacks
Investigation of Implementation Attacks
Disciplines
Electrical Engineering, Electronics, Information Engineering (15%); Computer Sciences (60%); Mathematics (25%)
Keywords
-
Embedded Systems,
Cryptography,
Side Channel Analysis (SCA),
Fault Attacks (FA),
SCA & FA Countermearsures,
VLSI Design
In order to provide security for sensitive data on smart cards and embedded systems cryptographic algorithms are used. Unfortunately, even if such an algorithm has been evaluated in a mathematical model, the realization might leak information due to physical aspects of its implementation. Methods that use these aspects are called implementation attacks. They range from side-channel analysis, which exploit unintentionally leaking information during a critical operation, to fault attacks, which try to manipulate the behavior of a device. Side channel analysis as well as fault attacks have been widely researched in the cryptographic community. While side-channel analysis has been considered in theory and practice, most publications on fault attacks are theoretical. Thus, there are still many open questions in the field of practical fault injection. Furthermore, side-channel analysis and fault attacks are mostly considered separated. Recent research in combined attacks indicates that there are various possibilities to develop new attacks and appropriate countermeasures. The first goal of this project is to investigate different methods to influence the behavior of a device. Based on the possibilities of such a manipulation, fault attacks as well as countermeasures against them are developed. Our second goal is to expand the research on fault attacks by combining them with side-channel analysis. Our third goal is to continue our study on side-channels, which has been conducted within the FWF-funded project P18321-N15.
Every day, millions of small electronic devices face their task of processing and transmitting sensitive information in a vast number of various scenarios: e.g., conditional access modules like smart cards, secure data transmission between dedicated cryptographic coprocessors, secure storage of sensitive information in an embedded system. The so-called security devices usually execute some kind of mathematically secure cryptographic algorithm using a secret, usually denoted as secret key. The simplest attack on such devices would be a brute-force attack. Due to the high complexity of modern cryptographic algorithms, breaking (i.e. revealing the secret key) such devices by means of brute-force attacks would require thousands of billions of years using todays most powerful supercomputers. However, except for mathematical cryptanalysis there are several attack scenarios targeting the implementation of the cryptographic algorithm within a hardware device. The investigation of various types of so-called implementation attacks was the main goal of this project.During the project we intensively worked on practical methods to inject faults into various microcontrollers, i.e. to intentionally cause a malfunction of the devices to either reveal secret information stored on the device or to bypass / deactivate countermeasures against implementation attacks on the device. We successfully injected faults into various common microcontrollers by manipulating the clock signal, the power supply, the ambient temperature, as well as by laser shots in the devices using different types of laser diodes (different wavelengths). It turned out that modern asymmetric encryption schemes like RSA can be broken within minutes, even if they are protected against basic implementation attacks.Another very important part of the project was the investigation of electromagnetic emanations in the far field (approximately 30cm) of passive UHF RFID tags. It turned out that commercial low-cost RFID tags can be attacked from a certain distance by performing measurements in the EM far field. Contrary, modern WISP tags seemed to be more resistant to attacks based on measurements in the far field. In case of these devices, a different measurement procedure close to the tags was necessary to perform successful attacks.Further important results of the project in the field of side-channel attacks were: a combination of HW and SW countermeasures on a 32-bit processor platform resulting in very high security; the demonstration that stepped EM measurements on a microcontroller can be used to track the data flow within the device to a certain degree; and a completely new approach for hardware designers to verify the resistance against side-channel attacks based on exploiting the side-channel leakages of two devices at once.The results of the achieved project goals have been disseminated in more than 10 publications in international conference proceedings and journals.
- Technische Universität Graz - 100%
Research Output
- 165 Citations
- 15 Publications
-
2012
Title Exploiting the Difference of Side-Channel Leakages DOI 10.1007/978-3-642-29912-4_1 Type Book Chapter Author Hutter M Publisher Springer Nature Pages 1-16 -
2012
Title Countermeasures for Symmetric Key Ciphers DOI 10.1007/978-3-642-29656-7_5 Type Book Chapter Author Schmidt J Publisher Springer Nature Pages 73-87 -
2012
Title On Measuring the Parasitic Backscatter of Sensor-enabled UHF RFID Tags DOI 10.1109/ares.2012.21 Type Conference Proceeding Abstract Author Plos T Pages 38-46 -
2012
Title On Measuring the Parasitic Backscatter of Sensor-enabled UHF RFID Tags. Type Conference Proceeding Abstract Author Maierhofer C Conference Gerald Quirchmayr, Josef Basl, Ilsun You, Lida Xu, Edgar Weippl, editors, 7th Conference on Availability, Reliability and Security (ARES 2012), Prague, Czech Republic, August 20-24 -
2011
Title Implementation and Evaluation of an SCA-Resistant Embedded Processor DOI 10.1007/978-3-642-27257-8_10 Type Book Chapter Author Tillich S Publisher Springer Nature Pages 151-165 Link Publication -
2011
Title Learning from Electromagnetic Emanations - A Case Study for iMDPL. Type Conference Proceeding Abstract Author Kirschbaum M Conference Second International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2011, 24-25 February 2011, Darmstadt, Germany, Workshop Proceedings COSADE 2011 -
2011
Title Test Apparatus for Side-Channel Resistance Compliance Testing. Type Conference Proceeding Abstract Author Hutter M Conference Non-Invasive Attack Testing Workshop - NIAT, Nara, Japan, September 26-27 -
2011
Title Low-cost fault detection method for ECC using Montgomery powering ladder. Type Conference Proceeding Abstract Author Karaklajic D Conference Design, Automation and Test in Europe, DATE 2011, Grenoble, France, March 14-18 -
2011
Title Masked Dual-Rail Precharge Logic Encounters State-of-the-Art Power Analysis Methods DOI 10.1109/tvlsi.2011.2160375 Type Journal Article Author Moradi A Journal IEEE Transactions on Very Large Scale Integration (VLSI) Systems Pages 1578-1589 -
2010
Title Algebraic Side-Channel Analysis in the Presence of Errors DOI 10.1007/978-3-642-15031-9_29 Type Book Chapter Author Oren Y Publisher Springer Nature Pages 428-442 -
2010
Title A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate DOI 10.1109/fdtc.2010.16 Type Conference Proceeding Abstract Author Medwed M Pages 66-71 -
2011
Title The Fault Attack Jungle - A Classification Model to Guide You DOI 10.1109/fdtc.2011.13 Type Conference Proceeding Abstract Author Verbauwhede I Pages 3-8 -
2011
Title Fault Attacks on the Montgomery Powering Ladder DOI 10.1007/978-3-642-24209-0_26 Type Book Chapter Author Schmidt J Publisher Springer Nature Pages 396-406 -
2011
Title Low-Cost Fault Detection Method for ECC Using Montgomery Powering Ladder DOI 10.1109/date.2011.5763165 Type Conference Proceeding Abstract Author Karaklajic D Pages 1-6 -
2013
Title On measuring the parasitic backscatter of sensor-enabled UHF RFID tags DOI 10.1016/j.istr.2013.02.004 Type Journal Article Author Plos T Journal Information Security Technical Report Pages 239-252