Back to Search
Start Over
Synthesis of Fault Attacks on Cryptographic Implementations
- Source :
- ACM Conference on Computer and Communications Security, ACM CCS 2014, ACM CCS 2014, Nov 2014, Scottsdale, United States. pp.16, ⟨10.1145/2660267.2660304⟩
- Publication Year :
- 2014
- Publisher :
- ACM, 2014.
-
Abstract
- International audience; Fault attacks are attacks in which an adversary with physical access to a cryptographic device, say a smartcard, tampers with the execution of an algorithm to retrieve secret mate-rial. Since the seminal Bellcore attack on modular exponen-tiation, there has been extensive work to discover new fault attacks against cryptographic schemes and develop counter-measures against such attacks. Originally focused on high-level algorithmic descriptions, these efforts increasingly fo-cus on concrete implementations. While lowering the ab-straction level leads to new fault attacks, it also makes their discovery significantly more challenging. In order to face this trend, it is therefore desirable to develop principled, tool-supported approaches that allow a systematic analy-sis of the security of cryptographic implementations against fault attacks. We propose, implement, and evaluate a new approach for finding fault attacks against cryptographic implementa-tions. Our approach is based on identifying implementation-independent mathematical properties, or fault conditions. We choose fault conditions so that it is possible to recover secret data purely by computing on sufficiently many data points that satisfy them. Fault conditions capture the essence of a large number of attacks from the literature, including lattice-based attacks on RSA. Moreover, they provide a ba-sis for discovering automatically new attacks: using fault conditions, we specify the problem of finding faulted imple-mentations as a program synthesis problem. Using a special-ized form of program synthesis, we discover multiple faulted attacks on RSA and ECDSA. Several of the attacks found by our tool are new, and of independent interest.
- Subjects :
- Modular exponentiation
business.industry
Computer science
Distributed computing
Elliptic Curve Digital Signature Algorithm
Cryptography
Adversary
Computer security
computer.software_genre
Abstraction layer
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Countermeasure
Physical access
Smart card
business
computer
Implementation
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
- Accession number :
- edsair.doi.dedup.....ed3b43014ab0dba8e037bf9366b41e6e
- Full Text :
- https://doi.org/10.1145/2660267.2660304