Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

15
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model Yossi Oren , Mathieu Renauld, François-Xavier Standaert and Avishai Wool CHES Workshop, Leuven, September 2012 1

Transcript of Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Page 1: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

1

Algebraic Side-Channel Attacks Beyond the Hamming Weight

Leakage ModelYossi Oren, Mathieu Renauld, François-Xavier

Standaert and Avishai WoolCHES Workshop, Leuven, September 2012

Page 2: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Outline

• What is Template-TASCA?• How do you use it?

Page 3: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Review: solvers and optimizers

SolverSet of m logical statements over n variables

x1, …,xn

Satisfying assignmentOptimizer

Goal function

Optimal

Page 4: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Cryptanalysis using solvers

• Modern crypto is strong enough to withstand Algebraic Cryptanalysis using solvers [MM00]

• If we add side-channel information the key can be recovered quickly and efficiently [RS09]

• Physical limitations of the attack setup introduce errors which can be overcome by replacing solvers with optimizers [OKPW10]

Massacci and Marraro, Journal of Automated

Reasoning 2000

Oren, Kirschbaum, Popp and Wool,CHES 2010

Renauld and Standaert, INSCRYPT 2009

Page 5: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Our contributions

• We extend ASCA from a priori (HW) leakage model towards any profiled model

• The resulting attack methodology, called Template-TASCA (alt. Template-Set-ASCA), combines the low data complexity of algebraic attacks and the versatility of template attacks

• Our results apply both to solvers and to optimizers

Page 6: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Versatility of Template-TASCA

6

Secret KeyHamming weights

Solver/ Optimizer

Secret KeyPower trace

Template Decoder

Page 7: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Versatility of Template-TASCA

7

Secret KeyHamming weights

Aposteriori probability

vectorsTemplate Decoder

Solver/ Optimizer

Power Trace EM Trace Whatever

Page 8: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Two cases of successful key recovery

uC ungrouped uC grouped by HW

ASIC ungrouped ASIC grouped by HW

Page 9: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Solvers and Optimizers

• Solvers are fast, optimizers are versatile

9

Page 10: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Solvers and Optimizers

• Solvers cannot operate over the entire solution space (need additional heuristics)

10

Page 11: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Shopping list

• Device under test (DUT)• Template decoder• Optimizer (or solver)• Cipher equations• Leak equations

Page 12: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Start like template…

• In offline phase, create template decoders for many intermediate states

• In online phase, apply decoders to power trace, obtaining multiple aposteriori probability vectors

Page 13: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

… end like TASCA

• Pass probability vectors, together with device description, to optimizer or solver

• The output will be the state (and key) which optimally matches the probabilities of all the intermediate values:

Page 14: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Summary

• Using Template-TASCA and Template-Set-ASCA, crypto devices can be attacked with very low data complexity• Any leak can be used, as long as a “soft

decoder” exists for it• This is theoretically a very strong attack –

can it have impact on real world devices?

14

Page 15: Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model 1.

Thank you!

http://iss.oy.ne.ro/Template-TASCA

15