Practical Invalid Curve Attacks on TLS-ECDH
Total Page:16
File Type:pdf, Size:1020Kb
Practical Invalid Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky Horst Görtz Institute for IT Security Ruhr University Bochum @jurajsomorovsky 1 Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1 Recent years revealed many attacks on TLS… • ESORICS 2004, Bard: The Vulnerability of SSL to Chosen Plaintext Attack • Eurocrypt 2002, Vaudenay: Security Flaws Induced by CBC Padding—Applications to SSL, IPSEC, WTLS • Crypto 1998, Bleichenbacher: Chosen Ciphertext Attacks Against Protocols based on the RSA Encryption Standard PKCS #1 Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2 2 Another “forgotten” attack • Invalid curve attack • Crypto 2000, Biehl et al.: Differential fault attacks on elliptic curve cryptosystems • Targets elliptic curves – Allows one to extract private keys • Are current libraries vulnerable? Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 3 3 Overview 1. Elliptic Curves 2. Invalid Curve Attacks 3. Application to TLS ECDH 4. Evaluation 5. Bonus Content Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 4 4 Elliptic Curve (EC) Crypto • Key exchange, signatures, PRNGs • Many sites switching to EC • Fast, secure – openssl speed rsa2048 ecdhp256 – ECDH about 10 times faster Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 5 5 Elliptic Curve • Set of points over a finite field 퐸: 푦2 = 푥3 + 푎푥 + 푏 푚표푑 푝 • Operations: ADD and DOUBLE • Example: DOUBLE 푎 = 9 푏 = 17 ADD 푝 = 23 Base Point P Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 6 6 Elliptic Curve Diffie Hellman (ECDH) Client Server Secret q Secret s qP sP q(sP) Shared secret: s(qP) = q(sP) sP qP Small 5 bit curve Base Point P Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 7 7 Elliptic Curves in Crypto • Have to be chosen very carefully: high order – P -> ADD -> ADD -> … -> ADD -> P order DOUBLE ADD • Predefined curves > 256 bits NIST, brainpool, … Base Point P Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 8 8 Overview 1. Elliptic Curves 2. Invalid Curve Attacks 3. Application to TLS ECDH 4. Evaluation 5. Bonus Content Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 9 9 Invalid Curve Attack • What if we compute with a point P’ outside of curve E? • P’ can have a small order • Example: – E’ with 256 bits – P’ generates 5 points Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1010 Invalid Curve Attack • What is the problem? • Shared secret has only 5 possible values! • Example 2P Server Secret s = 13 7P 8P • Server attempts to 3P 13P multiply sP 4P 9P 3 = 푠 푚표푑 5 5P = infinity 6P 10P = infinity 1P Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1111 Invalid Curve Attack • What is the problem? • Shared secret has only 5 possible values! • We can compute: 푠1 = 푠 푚표푑 5 푠2 = 푠 푚표푑 7 푠3 = 푠 푚표푑 11 푠4 = 푠 푚표푑 13 • Compute s with CRT Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1212 Overview 1. Elliptic Curves 2. Invalid Curve Attacks 3. Application to TLS ECDH 4. Evaluation 5. Bonus Content Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1313 Transport Layer Security (TLS) • EC since 2006 • Static and ephemeral • TLS server initialized with an EC certificate – Server has EC key Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1414 TLS ECDH TLS TLS Client Server ClientHello ServerHello Certificate: sP ServerHelloDone ClientKeyExchange: qP Premaster secret Used to compute keys 풑풎풔 = 풔 풒푷 = 풒(풔푷) ChangeCipherSpec (Client-) Finished: ChangeCipherSpec (Server-) Finished Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1515 Invalid Curve Attack on TLS 1. Generate invalid points with order 푝푖 = 5, 7, 11, 13 … 2. Use TLS server to get equations s = 푠푖 푚표푑 푝푖 3. Compute CRT to get secret key s Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1616 Overview 1. Elliptic Curves 2. Invalid Curve Attacks 3. Application to TLS ECDH 4. Evaluation 5. Bonus Content Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1717 Evaluation • 8 libraries – Bouncy Castle v1.50, Bouncy Castle v1.52, MatrixSSL, mbedTLS, OpenSSL, Java NSS Provider, Oracle JSSE, WolfSSL • 2 vulnerable • Practical test with NIST secp256r1 – Most commonly used [Bos et al., 2013] Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1818 Evaluation: Bouncy Castle v1.50 • Vulnerable – 74 equations – 3300 real server queries Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 1919 Evaluation: JSSE • Java Secure Socket Extension (JSSE) server accepted invalid points • However, the direct attack failed Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2020 Evaluation: JSSE • Problem: invalid computation with some EC points Valid Computations [%] EC point order • Attack possible: – 52 equations, 17000 server requests Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2121 Impact • Attacks extract server private keys • Huge problem for Java servers using EC certificates – For example Apache Tomcat – Static ECDH enabled per default • Key revocation • Not only applicable to TLS – Also to other Java applications using EC Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2222 Overview 1. Elliptic Curves 2. Invalid Curve Attacks 3. Application to TLS ECDH 4. Evaluation 5. Bonus Content Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2323 What’s next? • Hardware Security Modules • Devices for storage of crypto material Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2424 Attacker Model in HSM Scenarios • Key never leaves HSMs dec (C) Keys (RSA, EC, AES …) m Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2525 Attacker Model in HSM Scenarios • Key never leaves HSMs getKey Keys (RSA, EC, AES …) Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2626 How about Invalid Curve Attacks? • CVE-2015-6924 (with Dennis Felsch) • Utimaco HSMs vulnerable • < 100 queries to extract a key • Only possible thanks to our cooperation – Provided sample code, fast fix "Catastrophic" is the right word. On the scale • Utimaco HSM is FIPS certified of 1 to 10, this is an 11. • Other devices? Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2727 Conclusion • Old attacks still applicable, we can learn a lot from them • Bouncy Castle, JSSE and Utimaco broken • More tools / analyses of crypto applications needed • https://github.com/RUB-NDS/EccPlayground • http://web-in-security.blogspot.de/ • http://safecurves.cr.yp.to/ Practical Invalid Elliptic Curve Attacks on TLS-ECDH Tibor Jager, Jörg Schwenk, Juraj Somorovsky 2828.