+ All Categories
Home > Documents > Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS...

Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS...

Date post: 17-Dec-2015
Category:
Upload: marian-smith
View: 215 times
Download: 1 times
Share this document with a friend
Popular Tags:
17
Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore
Transcript
Page 1: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Wide Collisions in Practice

Xin Ye, Thomas EisenbarthFlorida Atlantic University, USA

10th ACNS 2012- Singapore

Page 2: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Overview

• Side Channel Collision Attacks

• Wide Collisions for AES

• Improving Recognition Rates

• Attack Results

Page 3: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Embedded Systems

• Specific purpose device with computing capabilities

• Constrained resources• Many require security

Page 4: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Side Channel Attacks

… leaks additional information via side channel!e.g. power consumption / EM emanation

AESLeakage

plaintext

ciphertext

0 20 40 60 80 100 120 140 160 180 200

-0.2

-0.1

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

Time

Corr

ela

tion

right key

wrong keys

Page 5: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Collisions in AES

Collision: Querying same S-box value twice

Collision Attack: Exploiting collision detections to recover secret key

S S S S S S SS S S S S S S

y1 y4 = y1

plaintextAdd_Key

Sub_Bytes

S-box 1 S-box 4

Page 6: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Collision Detection

Collisions are highly frequent:– First round: .41 collisions– One encryption: >40 collisions

Detecting collisions is hard:– One encryption: 12 720 comparisons– Probability of a collision: <0.4%– False positive rate of 1%: >120 faulty detections Should minimize false positives

Page 7: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Wide Collisions (I) Two AES encryptions with chosen inputs Same plaintexts except for diagonals! AddRoundKey, SubBytes -> same difference

Page 8: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Wide Collisions (II)

• ShiftRows aligns differences• MixColumns can result in equal bytes

Collision

Page 9: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Wide Collisions (III) 2nd ShiftRows results in equal columns Full column collides until next ShiftRows! 5 predictable S-Box collisions between 2 encryptions!

Full Column Collision

Page 10: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Collision Detection

• Direct Comparison of two power traces• Ideally only compared in leaking regions

(5 s-Boxes and full MixColumns colliding)

Point selection necessary:– Knowledge of implementation or profiling needed

S-box 4 S-boxes (in round 3)

+ S-box in round 2+ Mix Columns

Page 11: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Key Recovery Phase

• 1st byte after 1st MixColumns:

• 4 collisions reduce key candidates from 232 to 1 candidate per diagonal.

• Full key recovery: 16 distinct collisions.

Avoid false positives

Page 12: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Outlier MethodProcedure:

Find overallMean Trace

Locate Outlier Region

Locate Neighboring

Pairs Mean TraceIndividual Trace

Outlier Region

Page 13: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Outlier Method: Details

Two parameters:• Size of outlier region• Admitted distance between

neighboring points

Both influence• Number of detected collisions• Rate of false positives

Tradeoff depends on implementation

Page 14: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Results

Leaking Points Detected Collisions Correct Detections1 (R = 0.9, dmax = 0.3) 127 23.0%4 (R = 0.9, dmax = 0.3) 46 71.1%8 (R = 0.9, dmax = 0.3) 88 93.7%

Wide Collisions stronger, but knowledge of implementation or profiling needed

Blind Templates (+ PCA) are great for device profiling

• Unprotected SW implementation, 8-bit Smart Card• Results on 3000 power traces:

Page 15: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Optimized Collision Detection

• Targeting Wide Collisions– Strong leakage, easier to detect– Requires chosen inputs

• Using Outlier Detection method:– Reduces overall detection of collisions– Minimizes false positives

Page 16: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Conclusion

• Wide collisions yield feasible power based collision attack

• Outlier Method is a helpful tool for decreasing false positive detections

Page 17: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore.

Thank you very much for your [email protected]


Recommended