Cryptography Best Practices Outline Architectures (1A) (Sym

Total Page:16

File Type:pdf, Size:1020Kb

Cryptography Best Practices Outline Architectures (1A) (Sym Cryptography Best Practices February 2019 Bart Preneel Outline Cryptography Best Practices • Architecture Prof. Bart Preneel • Network protocols COSIC, an imec lab at KU Leuven • Security APIs Bart.Preneel(at)esatDOTkuleuven.be • Key establishment: protocols, http://homes.esat.kuleuven.be/~preneel generation, storage February 2019 • Implementing digital signature schemes 1 2 © Bart Preneel. All rights reserved Symmetric vs. Asymmetric Architectures (1a) (sym.) Algorithms 2 • hardware costs: 1 K– • hardware costs: 12 • Point to point • Number of keys: 1 or n 100K gates K-1M gates • Local • Manual keying • performance: 10 • performance: 10 • Small scale Mbit/s – 1000 Gbit/s Kbit/s – 100 Mbit/s • keys: 64-256 bits • keys: 256-4096 bits Example: • blocks: 64-128-256 • blocks: 256-4096 bits ad hoc PAN or bits • power consumption: WLAN • power consumption: 1000-2000 μJ/bit 3-30 μJ/bit • postquantum: keys of 10-500 Kbyte 3 n nodes 4 Architectures (2a) (sym.) Architectures (3a) (sym.) • Centralized • Number of keys: n • Centralized • Number of keys: n + 1/session • Small or large scale • ! Central database: risk + • Small or large scale • Manual keying big brother • Manual keying • ! Central database: risk + big • Non-repudiation of origin? brother (physical assumptions) • Non-repudiation of origin? (physical assumptions) Example: WLAN, e-banking, GSM Example: LAN (Kerberos) n nodes 5 n nodes 6 1 Cryptography Best Practices February 2019 Bart Preneel Architectures (4a) (sym.) Architectures (5a) (sym.) • Decentralized • Number of keys: n + N2 • Centralized • Number of keys: n + N • Large scale • Risks? • Trust • Large scale • Hard to manage • Hierarchy Example: credit Example: network card and ATM of LANs, GSM, 3G, 4G n + N nodes 7 n + N nodes 8 Architectures (1b) (asym.) Architectures (2b) (asym.) • Point to point • No CA (e.g. PGP) • Centralized • Reduced risk • Worldwide • Large or small scale • Non-repudiation of origin • Small networks Example: P2P, international Example: B2C organizations e-banking n nodes 9 n nodes 10 Architectures (3b) (asym.) Architectures (4b) (asym.) • Decentralized • Key management • Centralized • Reduced risk • Large scale architecture? • Small or large scale • Non-repudiation of origin • (Open) • Trust Example: B2B, Example: B2B GSM interoperator and e-ID communication n nodes 11 n + N nodes 12 2 Cryptography Best Practices February 2019 Bart Preneel Architectures (5b) (asym.) When asymmetric cryptology? • Centralized • Open • if manual secret key installation not • Large scale feasible (also in point-to-point) • Hierarchy • open networks (no prior customer relation or contract) • get rid of risk of central key store Example: credit • mutually distrusting parties card EMV – strong non-repudiation of origin is needed • fancy properties: e-voting Important lesson: on-line trust relationships n + N nodes 13 should reflect real-word trust relationships14 EMV Static Data Authentication (SDA) EMV: dynamic/combined data authentication CERTISS Private Public Key CA (PISS Key certified SCA PCA with SCA) EPI Three layers: Private Public Key EPI Key Issuer Acquirer SISS PISS Issuers Issuer Issuer Issuer Static Card Cards Issuer data IC Distributed to Acquirer (Resides in Terminal) PCA IC Card POS15 Device 16 Certificate for dynamic data EMV Combined Data Authentication authentication of a credit card CERT ISS Private Public Key (PISS Key Unique name owner certified SCA PCA DN: cn=Jan Peeters, with SCA) EPI o=KBC, c=BE Unique serial number Serial #: 8391037 CERTIC Private Public Key Validity period (PIC Key Start: 3/12/18 1:00 certified Issuer SISS PISS Acquirer End: 4/12/21 12:01 Revocation information with SISS) CRL: cn=RVC, o=EMV, c=BE Public key Private Public Key Static Card Key data Key: IC P Name of issuing CA SIC IC Distributed to Acquirer (Resides in Terminal) CA’s Digital signature on the CA DN: o=EMV, c=BE certificate Authenticate and Sign Transaction with SIC PCA 17 IC Card POS18 Device 3 Cryptography Best Practices February 2019 Bart Preneel Warning about EMV Network protocols http://www.cl.cam.ac.uk/research/security/banking/nopin/oakland10chipbroken.pdf • Pin checking and authentication are not coupled • EMV PIN verification “wedge” vulnerability S.J. Host Host Murdoch, S. Drimer, R. Anderson, M. Bond, IEEE Security Application Application S/MIME & Privacy 2010 Presentation Presentation Session Session Transport Router Transport TLS/SSL Network Network Network IPsec Data link Data link Data link PPTP, Physical Physical Physical L2TP 19 20 Where to put security? Where to put security? (2) • Application layer: From: [email protected] – closer to user To: [email protected] – more sophisticated/granular controls Subject: Re: Can you meet me on Monday at – end-to-end 3pm to resolve the price issue? – but what about firewalls? • Lower layer: This proposal is acceptable for me. – application independent -- Bob – hide traffic data – but vulnerable in middle points • Combine? 21 22 Security APIs Master key/data key • Security module controls access to and • Load master 3DES key KM (tightly controlled) processing of sensitive data • Load data key: – executes cryptographic commands, e.g. PIN 3DES (K1)|| 3DES (K2)|| 3DES (K3) checking, encryption,… KM KM KM • Send plaintext P and ask for encryption I/O -1 DESK1(DES K2( DESK3(P))) Security module Host DES DES-1 DES %^C& hardware or software P @&^( network Security API 23 1 2 3 24 4 Cryptography Best Practices February 2019 Bart Preneel Master key/data key (2) Control vectors in the IBM 4758 (1) • Load master 3DES key KM (tightly controlled) • Potted in epoxy resin • Load corrupted data key: • Protective tamper-sensing membrane, DES (K1)|| DES (K1)|| DES (K1) KM KM KM chemically identical to potting compound • Send plaintext P and ask for encryption -1 • Detectors for temperature & X-Rays DESK1(DES K1( DESK1(P))) = DESK1(P) • “Tempest” shielding for RF emission • Low pass filters on power supply rails DES DES-1 DES %^C& • Multi-stage “latching” boot sequence P @&^( = STATE OF THE ART PROTECTION! 1 1 1 25 26 IBM 4758 Features of the IBM 4758 • Control vector: type (e.g., PIN, data, MAC) store key of type type as E Km + “type” (k) – Output of encryption with key of type “PIN” is never allowed to leave the box – Output of encryption with key of type data, MAC, … may leave the box • High security master key import: 3 shares – Import Km as KmA + KmB + KmC 27 28 Master key import Fraudulous import Km = Km + Km Km C C KmA KmB KmC A B “data” – “PIN” 1 2 Km = KmA + KmB + KmC Km* = KmA + KmB + KmC* = Km + “data” – “PIN” 29 30 5 Cryptography Best Practices February 2019 Bart Preneel The attack Lessons learned: security APIs Transport PIN key k from box 1 to box 2 • Complex – 150 commands 1. Encrypt on box 1, type PIN: • Need to resist to insider frauds x = E (k) • Hard to design – can go wrong in many Km + “PIN” ways 2. Decrypt on box 2, type data: • Need more attention D Km* + “DATA” (x) = D Km + “PIN” (x) = k Further reading: Mike Bond, Cambridge The system now believes that k is a key to University decrypt data, which means that the result will http://www.cl.cam.ac.uk/users/mkb23/research.html be output (PINs are never output in the clear) 31 32 “Efficient padding oracle attacks on The secure hardware delusion cryptographic hardware” (PKCS#11 devices) [Bardou+ 12] most attacks take less than 100 milliseconds e.g. August 2011 Diginotar: target Iranian opposition Device PKCS#1v1.5 CBC pad Ceci n’est pas token session token session Aladdin eTokenPro X X X X un HSM Feitian ePass 2000 OK OK N/A N/A Feitian ePass 3003 OK OK N/A N/A Gemalto Cyberflex X N/A N/A N/A TLS RSA Securid 800 X N/A N/A N/A Safenet iKey 2032 X X N/A N/A SATA dKey OK OK OK OK Siemens CardOS X X N/A N/A (89 secs) Key establishment protocols: Key management subtle flaws • Key establishment protocols • Person-in-the middle attack • Key generation – Lack of protected identifiers • Key storage • Reflection attack • Key separation (cf. Security APIs) • Triangle attack 35 36 6 Cryptography Best Practices February 2019 Bart Preneel Attack model: Person-in-the middle attack on Diffie- Needham and Schroeder [1978]: Hellman • Eve shares a key k1 with Alice and a key k2 We assume that the intruder can interpose with Bob a computer in all communication paths, • Requires active attack and thus can alter or copy parts of messages, replay messages, or emit false material. While this may seem an extreme view, it is the only safe one x1 x2 when designing authentication protocols. y1 y2 k1 =( y1) x1 =( x1)y1 k2 =( y2) x2 =( x2)y2 37 38 Entity authentication Entity authentication: reflection attack Eve does not know K and wants to Alice and Bob share a secret K impersonate Bob K K n K A nA nA EK(n||nA’) EK(nA||nB) EK(nA||nA’ =nB) nB 39 40 nB Needham-Schroeder (1978) Lowe’s attack on Needham-Schroeder (1995) Alice and Bob know each other’s public key PA and PB • Alice thinks she is talking to Eve • Bob thinks he is talking to Alice S SB SA SB A Derive a EPE(nA||A) EPB(nA||A) EPB(nA||A) session key EPA(nB||nA) EPA(nB||nA) EPA(nB||nA) k from nA||nB EPE(nB) EPB(nB) EPB(nB) 41 Eve 42 7 Cryptography Best Practices February 2019 Bart Preneel Lowe’s attack on Needham-Schroeder (1995) Lessons from Needham-Schroeder (1995) • Eve is a legitimate user = insider attack • Fix the problem by inserting B in message 2 • Prudent engineering practice (Abadi & Needham): include names of principals in all messages SA SB • IKE v2 – plausible deniability: don’t include name of correspondent in signed messages: http://www.ietf.org/proceedings/02nov/I-D/draft-
Recommended publications
  • Improved Related-Key Attacks on DESX and DESX+
    Improved Related-key Attacks on DESX and DESX+ Raphael C.-W. Phan1 and Adi Shamir3 1 Laboratoire de s´ecurit´eet de cryptographie (LASEC), Ecole Polytechnique F´ed´erale de Lausanne (EPFL), CH-1015 Lausanne, Switzerland [email protected] 2 Faculty of Mathematics & Computer Science, The Weizmann Institute of Science, Rehovot 76100, Israel [email protected] Abstract. In this paper, we present improved related-key attacks on the original DESX, and DESX+, a variant of the DESX with its pre- and post-whitening XOR operations replaced with addition modulo 264. Compared to previous results, our attack on DESX has reduced text complexity, while our best attack on DESX+ eliminates the memory requirements at the same processing complexity. Keywords: DESX, DESX+, related-key attack, fault attack. 1 Introduction Due to the DES’ small key length of 56 bits, variants of the DES under multiple encryption have been considered, including double-DES under one or two 56-bit key(s), and triple-DES under two or three 56-bit keys. Another popular variant based on the DES is the DESX [15], where the basic keylength of single DES is extended to 120 bits by wrapping this DES with two outer pre- and post-whitening keys of 64 bits each. Also, the endorsement of single DES had been officially withdrawn by NIST in the summer of 2004 [19], due to its insecurity against exhaustive search. Future use of single DES is recommended only as a component of the triple-DES. This makes it more important to study the security of variants of single DES which increase the key length to avoid this attack.
    [Show full text]
  • Models and Algorithms for Physical Cryptanalysis
    MODELS AND ALGORITHMS FOR PHYSICAL CRYPTANALYSIS Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨at fur¨ Elektrotechnik und Informationstechnik an der Ruhr-Universit¨at Bochum von Kerstin Lemke-Rust Bochum, Januar 2007 ii Thesis Advisor: Prof. Dr.-Ing. Christof Paar, Ruhr University Bochum, Germany External Referee: Prof. Dr. David Naccache, Ecole´ Normale Sup´erieure, Paris, France Author contact information: [email protected] iii Abstract This thesis is dedicated to models and algorithms for the use in physical cryptanalysis which is a new evolving discipline in implementation se- curity of information systems. It is based on physically observable and manipulable properties of a cryptographic implementation. Physical observables, such as the power consumption or electromag- netic emanation of a cryptographic device are so-called `side channels'. They contain exploitable information about internal states of an imple- mentation at runtime. Physical effects can also be used for the injec- tion of faults. Fault injection is successful if it recovers internal states by examining the effects of an erroneous state propagating through the computation. This thesis provides a unified framework for side channel and fault cryptanalysis. Its objective is to improve the understanding of physi- cally enabled cryptanalysis and to provide new models and algorithms. A major motivation for this work is that methodical improvements for physical cryptanalysis can also help in developing efficient countermea- sures for securing cryptographic implementations. This work examines differential side channel analysis of boolean and arithmetic operations which are typical primitives in cryptographic algo- rithms. Different characteristics of these operations can support a side channel analysis, even of unknown ciphers.
    [Show full text]
  • On the Related-Key Attacks Against Aes*
    THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 13, Number 4/2012, pp. 395–400 ON THE RELATED-KEY ATTACKS AGAINST AES* Joan DAEMEN1, Vincent RIJMEN2 1 STMicroElectronics, Belgium 2 KU Leuven & IBBT (Belgium), Graz University of Technology, Austria E-mail: [email protected] Alex Biryukov and Dmitry Khovratovich presented related-key attacks on AES and reduced-round versions of AES. The most impressive of these were presented at Asiacrypt 2009: related-key attacks against the full AES-256 and AES-192. We discuss the applicability of these attacks and related-key attacks in general. We model the access of the attacker to the key in the form of key access schemes. Related-key attacks should only be considered with respect to sound key access schemes. We show that defining a sound key access scheme in which the related-key attacks against AES-256 and AES- 192 can be conducted, is possible, but contrived. Key words: Advanced Encryption Standard, AES, security, related-key attacks. 1. INTRODUCTION Since the start of the process to select the Advanced Encryption Standard (AES), the block cipher Rijndael, which later became the AES, has been scrutinized extensively for security weaknesses. The initial cryptanalytic results can be grouped into three categories. The first category contains attacks variants that were weakened by reducing the number of rounds [0]. The second category contains observations on mathematical properties of sub-components of the AES, which don’t lead to a cryptanalytic attack [0]. The third category consists of side-channel attacks, which target deficiencies in hardware or software implementations [0].
    [Show full text]
  • A Practical Attack on the Fixed RC4 in the WEP Mode
    A Practical Attack on the Fixed RC4 in the WEP Mode Itsik Mantin NDS Technologies, Israel [email protected] Abstract. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the gen- erated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4 in several modes. Our main result is a practical key recovery attack on RC4 when an IV modifier is concatenated to the beginning of a secret root key to generate a session key. As opposed to the WEP attack from [FMS01] the new attack is applicable even in the case where the first 256 bytes of the keystream are thrown and its complexity grows only linearly with the length of the key. In an exemplifying parameter setting the attack recov- ersa16-bytekeyin248 steps using 217 short keystreams generated from different chosen IVs. A second attacked mode is when the IV succeeds the secret root key. We mount a key recovery attack that recovers the secret root key by analyzing a single word from 222 keystreams generated from different IVs, improving the attack from [FMS01] on this mode. A third result is an attack on RC4 that is applicable when the attacker can inject faults to the execution of RC4. The attacker derives the internal state and the secret key by analyzing 214 faulted keystreams generated from this key. Keywords: RC4, Stream ciphers, Cryptanalysis, Fault analysis, Side- channel attacks, Related IV attacks, Related key attacks. 1 Introduction RC4 is the most widely used stream cipher in software applications.
    [Show full text]
  • Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers
    Hindawi Security and Communication Networks Volume 2020, Article ID 3701067, 11 pages https://doi.org/10.1155/2020/3701067 Research Article Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers Jaewoo So Department of Electronic Engineering, Sogang University, Seoul 04107, Republic of Korea Correspondence should be addressed to Jaewoo So; [email protected] Received 5 February 2020; Revised 21 June 2020; Accepted 26 June 2020; Published 13 July 2020 Academic Editor: Umar M. Khokhar Copyright © 2020 Jaewoo So. +is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Most of the traditional cryptanalytic technologies often require a great amount of time, known plaintexts, and memory. +is paper proposes a generic cryptanalysis model based on deep learning (DL), where the model tries to find the key of block ciphers from known plaintext-ciphertext pairs. We show the feasibility of the DL-based cryptanalysis by attacking on lightweight block ciphers such as simplified DES, Simon, and Speck. +e results show that the DL-based cryptanalysis can successfully recover the key bits when the keyspace is restricted to 64 ASCII characters. +e traditional cryptanalysis is generally performed without the keyspace restriction, but only reduced-round variants of Simon and Speck are successfully attacked. Although a text-based key is applied, the proposed DL-based cryptanalysis can successfully break the full rounds of Simon32/64 and Speck32/64. +e results indicate that the DL technology can be a useful tool for the cryptanalysis of block ciphers when the keyspace is restricted.
    [Show full text]
  • Public Evaluation Report UEA2/UIA2
    ETSI/SAGE Version: 2.0 Technical report Date: 9th September, 2011 Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report LTE Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. page 1 of 43 Document 4: Design and Evaluation report. Version 2.0 Document History 0.1 20th June 2010 First draft of main technical text 1.0 11th August 2010 First public release 1.1 11th August 2010 A few typos corrected and text improved 1.2 4th January 2011 A modification of ZUC and 128-EIA3 and text improved 1.3 18th January 2011 Further text improvements including better reference to different historic versions of the algorithms 1.4 1st July 2011 Add a new section on timing attacks 2.0 9th September 2011 Final deliverable LTE Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. page 2 of 43 Document 4: Design and Evaluation report. Version 2.0 Reference Keywords 3GPP, security, SAGE, algorithm ETSI Secretariat Postal address F-06921 Sophia Antipolis Cedex - FRANCE Office address 650 Route des Lucioles - Sophia Antipolis Valbonne - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 X.400 c= fr; a=atlas; p=etsi; s=secretariat Internet [email protected] http://www.etsi.fr Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media.
    [Show full text]
  • Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures
    Modi¯ed Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures Nick Howgrave-Graham, Joe Silverman, Ari Singer, William Whyte NTRU Cryptosystems Abstract. We introduce the concept of Modi¯ed Parameter Attacks, a natural extension of the idea of Adapative Chosen Ciphertext Attacks (CCA2) under which some CCA2 secure systems can be shown to be insecure. These insecurities can be addressed at the application level, but can also be addressed when cryptographic schemes are being designed. We survey some existing CCA2 secure systems which are vulnerable to this attack and suggest practical countermeasures. 1 Introduction It is of great interest, when studying cryptosystems, to make statements about their security under certain attack models. The contribution of this paper is to suggest an attack model for public key encryption schemes, stronger than those typically considered at present, within which the se- curity properties of the scheme can be evaluated. We start by identifying existing concepts used in the study of public key encryption schemes. First, we review security properties of indistin- guishability and non-malleability. Each of these properties can be looked on as the ability to resist a particular type of attack. { Indistinguishability: An attacker submits two plaintexts, x0 and x1, to an encryption oracle, which encrypts one of them and outputs the ciphertext y. If the attacker cannot identify, with non-negligible advantage, the plaintext which was used to produce y, the system is said to have the property of indistinguishability. { Non-Malleability: An attacker is given a plaintext x and the corre- sponding ciphertext y. If the attacker can alter y to obtain y0, where y0 decrypts to a message x0 that is related to x in some simple way, then the system is said to be malleable.
    [Show full text]
  • From Semantic Security to Chosen Ciphertext Security Sahnghyun Cha Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2010 From semantic security to chosen ciphertext security Sahnghyun Cha Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Sciences Commons Recommended Citation Cha, Sahnghyun, "From semantic security to chosen ciphertext security" (2010). Graduate Theses and Dissertations. 11707. https://lib.dr.iastate.edu/etd/11707 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. From semantic security to chosen ciphertext security by Sahnghyun Cha A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Computer Science Program of Study Committee: Clifford Bergman, Major Professor David Fernandez-Baca Pavan Aduri Iowa State University Ames, Iowa 2010 Copyright c Sahnghyun Cha, 2010. All rights reserved. ii TABLE OF CONTENTS ABSTRACT . iii 1 Introduction . 1 2 Definition . 1 2.1 Possible Cryptanalytic Attacks . 1 2.2 Security Notions For Public Key Cryptosystem . 3 3 Semantically Secure Encryption . 6 3.1 Plain RSA Is Not Semantically Secure . 6 3.2 Random Padding Scheme . 8 3.3 Beyond Semantic Security . 9 3.4 A Watered Down Bleichenbacher's Attack . 12 4 Provably Secure Encryption Schemes Against CCA2 . 15 BIBLIOGRAPHY . 17 iii ABSTRACT A chosen ciphertext attack against the RSA encryption standard PKCS#1 v1.5 was intro- duced by Daniel Bleichenbacher at Crypto '98.
    [Show full text]
  • A Pattern Recognition Approach to Block Cipher
    A PATTERN RECOGNITION APPROACH TO BLOCK CIPHER IDENTIFICATION A THESIS submitted by SREENIVASULU NAGIREDDY for the award of the degree of MASTER OF SCIENCE (by Research) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING INDIAN INSTITUTE OF TECHNOLOGY MADRAS. October 2008 Dedicated to my parents i THESIS CERTIFICATE This is to certify that the thesis entitled A Pattern Recognition Approach to Block Cipher Identification submitted by Sreenivasulu Nagireddy to the Indian Institute of Technology Madras, for the award of the degree of Master of Science (By Research) is a bonafide record of research work carried out by him under our supervision and guidance. The contents of this thesis, in full or in parts, have not been submitted to any other Institute or University for the award of any degree or diploma. Dr. C. Chandra Sekhar Dr. Hema A. Murthy Chennai-600036 Date: ACKNOWLEDGEMENTS I wish to express my gratitude to everyone who contributed in making this work a reality. There are persons not mentioned here but, deserve my token of appreciation, first of all, I thank them all. Let me also thank the Indian Institute of Technology Madras for giving me an opportunity to pursue my post graduation. I am grateful to Computer science department for providing the facilities for the same. This institute has given me great exposure. There has been a drastic change in my vision of life. I enjoyed every moment of my IIT life. I would like to thank my guides, Prof. Hema A. Murthy and Dr. C Chandra Sekhar whose expertise, understanding, and patience, helped me through the course.
    [Show full text]
  • Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
    Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack Mohd Anuar Mat Isa1, Habibah Hashim2 Faculty of Electrical Engineering, 40450 UiTM Shah Alam, Selangor, Malaysia. [email protected], [email protected]. Abstract—We have introduced a novel adversary model in work, we proposed an enhanced data communication package Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) [1] for DENX-UBOOT [8] firmware to include a secure TFTP and it was a practical model because the model incorporates the protocol. However, our proposal did not suggest a specific timing attack. This paper is an extended paper for “A Secure cryptographic protocol for the successful implementation of the TFTP Protocol with Security Proofs” [1]. secure TFTP protocol [3]. In the effort to further augment the work, a proven secure and practical asymmetric cryptographic scheme, i.e. the Cramer-Shoup (CS) protocol is proposed to be Keywords—Timing Attack, Random Oracle Model, deployed as the underlying cryptographic protocol [9] in the Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen overall scheme. One may refer to [1]. Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, III. RELATED WORK Privacy, Trusted Computing, UBOOT, AES, IOT, Lightweight, Asymmetric, Symmetric, Raspberry Pi. A. Chosen Plaintext Attack (CPA) Goldwasser-Micali (1982) [10] proposed a probabilistic I. INTRODUCTION encryption to replace a trapdoor-function for a better security This paper is a continuation from our previous work in years evaluation in any encryption scheme. The authors argued that, 2012 and 2014 [1]–[3]. The paper was written in a general trapdoor-function do not cover “the possibility of computing 푥 information security terminology with a simple mathematical from 푓(푥) when 푥 is of special form” and “the possibility of notation (semi-formal).
    [Show full text]
  • Active and Passive Side-Channel Key Recovery Attacks on Ascon
    Active and Passive Side-Channel Key Recovery Attacks on Ascon Keyvan Ramezanpour1 , Abubakr Abdulgadir2 , William Diehl1 , Jens-Peter Kaps2 , and Paul Ampadu1 1 Virginia Tech, Blacksburg, VA 24061, USAfrkeyvan8,wdiehl,[email protected] 2 George Mason University, Fairfax, VA 22033, USA faabdulga,[email protected] Abstract. Physical exposure of devices to adversaries in unprotected environments in the era of the Internet of Things (IoT) necessitates eval- uation of cryptographic hardware implementations against side-channel analysis (SCA). The Ascon authenticated cipher has been accepted to Round 2 of the U.S. National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) Standardization Process, and was selected as the first choice of the CAESAR committee for the lightweight use case. In this paper, we evaluate the vulnerability of Ascon to both passive and active SCA attacks. Using a lightweight implementation of Ascon on an Artix-7 FPGA, we demonstrate a successful statistical inef- fective fault analysis (SIFA) attack using voltage glitches on the supply pin of the FPGA chip. Using only 280 correct values of the output au- thentication tags under fault injection into a pair of S-boxes, one subset of the secret key (equivalent to two bits) is recovered. We also demon- strate that a power analysis attack using a deep learning technique is able to find the secret key using 24K power traces during S-box compu- tations at the beginning of the Initialization stage of Ascon. Conversely, classical DPA and CPA attacks fail to find the correct key with more than 40K traces. Keywords: Ascon · Fault injection analysis · SIFA · Side Channel Anal- ysis · Deep Learning · FPGA · Voltage glitch · FOBOS.
    [Show full text]
  • Attacks and Countermeasures for White-Box Designs⋆
    Attacks and Countermeasures for White-box Designs? Alex Biryukov1( ) and Aleksei Udovenko2( ) 1 SnT and CSC, University of Luxembourg, Esch-sur-Alzette, Luxembourg [email protected] 2 SnT, University of Luxembourg, Esch-sur-Alzette, Luxembourg [email protected] Abstract. In traditional symmetric cryptography, the adversary has access only to the inputs and outputs of a cryptographic primitive. In the white-box model the adversary is given full access to the implementation. He can use both static and dynamic analysis as well as fault analysis in order to break the cryptosystem, e.g. to extract the embedded secret key. Implementations secure in such model have many applications in industry. However, creating such implementations turns out to be a very challenging if not an impossible task. Recently, Bos et al. [7] proposed a generic attack on white-box primitives called differential computation analysis (DCA). This attack was applied to many white-box implementations both from academia and industry. The attack comes from the area of side-channel analysis and the most common method protecting against such attacks is masking, which in turn is a form of secret sharing. In this paper we present multiple generic attacks against masked white-box implementations. We use the term \masking" in a very broad sense. As a result, we deduce new constraints that any secure white-box implementation must satisfy. Based on the new constraints, we develop a general method for protecting white-box implementations. We split the protection into two independent components: value hiding and structure hiding. Value hiding must pro- vide protection against passive DCA-style attacks that rely on analysis of computation traces.
    [Show full text]