On recovering block cipher secret keys in the cold boot attack setting

被引:0
|
作者
Banegas, Gustavo [1 ,2 ]
Villanueva-Polanco, Ricardo [3 ]
机构
[1] Inst Polytech Paris, Inria, Palaiseau, France
[2] Inst Polytech Paris, Lab Informat Ecole Polytech, Palaiseau, France
[3] Univ Norte, Dept Comp Sci & Engn, KM 5 Via Puerto Colombia, Barranquilla 081007, Colombia
关键词
Cold boot attacks; Grover's quantum algorithm; Key enumeration; Key recovery; Post-quantum signature schemes; Side-channel attacks; ENUMERATION; SEARCH;
D O I
10.1007/s12095-022-00625-z
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a general strategy to recover a block cipher secret key in the cold boot attack setting. More precisely, we propose a key-recovery method that combines key enumeration algorithms and Grover's quantum algorithm to recover a block cipher secret key after an attacker has procured a noisy version of it via a cold boot attack. We also show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC. Additionally, since evaluating the third-round post-quantum candidates of the National Institute of Standards and Technology (NIST) post-quantum standardization process against different attack vectors is of great importance for their overall assessment, we show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition. According to our results, our method may recover the Picnic private key for all Picnic parameter sets, tolerating up to 40% of noise for some of the parameter sets. Furthermore, we provide a detailed analysis of our method by giving the cost of its resources, its running time, and its success rate for various enumerations.
引用
收藏
页码:311 / 335
页数:25
相关论文
共 50 条
  • [1] Recovering AES Keys with a Deep Cold Boot Attack
    Zimerman, Itamar
    Nachmani, Eliya
    Wolf, Lior
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 139, 2021, 139
  • [2] A Practical Cold Boot Attack on RSA Private Keys
    Wang, Tian
    Cui, Xiaoxin
    Ni, Yewen
    Yu, Dunshan
    Cui, Xiaole
    Qu, Gang
    PROCEEDINGS OF THE 2017 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2017, : 55 - 60
  • [3] An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure
    Kunihiro, Noboru
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 61 - 81
  • [4] Transfer of Secret Keys in a Quantum Network with Trusted Intermediate Nodes and with Block Cipher Encryption
    S. N. Molotkov
    JETP Letters, 2023, 117 : 476 - 484
  • [5] Transfer of Secret Keys in a Quantum Network with Trusted Intermediate Nodes and with Block Cipher Encryption
    Molotkov, S. N.
    JETP LETTERS, 2023, 117 (06) : 476 - 484
  • [6] Saturation Attack on the Block Cipher HIGHT
    Zhang, Peng
    Sun, Bing
    Li, Chao
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 76 - 86
  • [7] Recovering Short Secret Keys of RLCE in Polynomial Time
    Couvreur, Alain
    Lequesne, Matthieu
    Tillich, Jean-Pierre
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 133 - 152
  • [8] What is the effective key length for a block cipher: an attack on every practical block cipher
    Huang JiaLin
    Lai XueJia
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (07) : 1 - 11
  • [9] Building a block cipher mode of operation with feedback keys
    Huang, Yi-Li
    Leu, Fang-Yie
    Liu, Jung-Chun
    Yang, Jing-Hao
    Yu, Chih-Wei
    Chu, Cheng-Chung
    Yang, Chao-Tung
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2013,
  • [10] What is the effective key length for a block cipher: an attack on every practical block cipher
    HUANG JiaLin
    LAI XueJia
    ScienceChina(InformationSciences), 2014, 57 (07) : 138 - 148