yossi oren, mario kirschbaum, thomas popp and avishai wool, · yossi oren, mario kirschbaum, thomas...

18
Algebraic Side-Channel Analysis in the Presence of Errors Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1

Upload: others

Post on 22-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

Algebraic Side-Channel Analysis in the Presence of Errors

Yossi Oren, Mario Kirschbaum,Thomas Popp and Avishai Wool,

1

Page 2: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

2

Page 3: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

\end

{personal_statement}

3

Page 4: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

4

Solver

Set of m logical statements over n variables x1, …,xn

Satisfying assignment (or proof of unsatisfiability)

Page 5: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

Cryptanalysis with Solvers

• Recall the basic problem of cryptanalysis: Given a description of a crypto algorithm and a set of plaintext and ciphertext pairs, find the cryptographic key

• Idea: Use solvers to perform cryptanalysis [MM ‘00]

• Result: Modern crypto is strong enough to resist solvers

5

Massacci and Marraro, Journal of Automated

Reasoning 2000

Page 6: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

Side-Channel Analysis with Solvers

• Recall the basic problem of side-channel analysis : Given a description of a crypto device, plaintexts, ciphertexts and a set of power measurements, find the crypto key

• Idea: Use solvers to perform side-channel analysis [PRR+ ’07 & RSV-C‘09]

• Result: key can be recovered from side channel data, but….

6

Potlapally, Raghunathan, Ravi, Jha, Lee

IEEE Trans. VLSI 2007

Renauld, Standaert, Veyrat-Charvillon

CHES 2009

Page 7: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

but…

7

Page 8: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

The Harsh Reality of Power Analysis

Vdd

GND

a

A

P1

C1

C2

N1

Output

Power Trace

Page 9: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

The Harsh Reality of Power Analysis

• The side channel traces have errors

• When using solver-based approaches, this results in unsatisfiability

• Can we find a solver that deals with errors?

Page 10: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

Pseudo-Boolean Optimizers

• Linear PBOPT:

(all coefficients are signed integers)• Non-linear PBOPT allows NL constraints

10

Page 11: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

PBOPT is Great for Side-Channels

• The variables (=flipflops) are pseudo-Boolean

• The constraints(=measurements) are integers

• NL notation rich enough to represent arbitrary functions (such as XORs)

11

• NOR: -out +~x1~x2 = 0

• XOR: -out +x1 +x2 -2x1x2 = 0

• Keeloq NLF:

-~out +x1x5 -x5 -x1x3 -x2x3 -x4 +x2x5+x3x4 +x4x5 +x1x2x3 +x1x2x4 -2x1x2x5 +x1x3x5-x1x4x5 = -1

Page 12: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

The Keeloq Cipher

• Block cipher used for car alarm systems

• Reduced version broken with solvers [CBW’08]

• Full version broken with classical DPA [EKM+’08]

12

Courtois, Bard, WagnerFSE 2008

Eisenbarth, Kasper, Moradi, Paar, Salmasizadeh, Manzuri Shalmani,

CRYPTO 2008

Page 13: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

The Keeloq Cipher

13

Page 14: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

An equation system for Keeloq

• Round function

• Input Assignment

• Side channel setup

• Side channel measurement with errors

14

Page 15: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

SCIP

• Stands for Solving Constraint Integer Programs

• Developed by Konrad-Zuse-Zentrum fürInformationstechnik Berlin – free under academic license

• “Fastest non-commercial mixed integer programming solver”

• Won first prize for NL OPT in PB 2009 and PB 2010 competitions

15

Page 16: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

A Successful Attack

• Solver: SCIP

• Cryptosystem: Keeloq

• Error rate: 18%

• Avg. Solving time: 3.6 hours

• 10-100 times faster than greedy Viterbi methods

16

Page 17: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

Future Work

• More cryptosystems (e.g. AES)

• More optimizers (e.g. Weighted CSP)

• Integrate into an ASIC workflow

17

Page 18: Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, · Yossi Oren, Mario Kirschbaum, Thomas Popp and Avishai Wool, 1. 2 \end {personal_statement} 3. 4 Solver Set of m logical

Thank you!

http://iss.oy.ne.ro/TASCA

18