Photonic Side Channel Attacks Against RSA

被引:0
|
作者
Carmon, Elad [1 ]
Seifert, Jean-Pierre [2 ,3 ]
Wool, Avishai [1 ]
机构
[1] Tel Aviv Univ, IL-69978 Tel Aviv, Israel
[2] Tech Univ Berlin, Secur Telecommun, Darmstadt, Germany
[3] FhG SIT, Darmstadt, Germany
关键词
EMISSION; SILICON; AES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper describes the first attack utilizing the photonic side channel against a public-key crypto-system. We evaluated three common implementations of RSA modular exponentiation, all using the Karatsuba multiplication method. We discovered that the key length had marginal impact on resilience to the attack: attacking a 2048-bit key required only 9% more decryption attempts than a 1024-bit key. We found that the most dominant parameter impacting the attacker's effort is the minimal block size at which the Karatsuba method reverts to naive multiplication: even for parameter values as low as 32 or 64 bits our attacks achieve 100% success rate with under 10,000 decryption operations. Somewhat surprisingly, we discovered that Montgomery's Ladder-commonly perceived as the most resilient of the three implementations to side-channel attacks-was actually the most susceptible: for 2048-bit keys, our attack reveals 100% of the secret key bits with as few as 4000 decryptions.
引用
收藏
页码:74 / 78
页数:5
相关论文
共 50 条
  • [41] Security Analysis of Raspberry Pi Against Side-Channel Attack with RSA Cryptography
    Sanada, Akihiro
    Nogami, Yasuyuki
    Iokibe, Kengo
    Khandaker, Md. Al-Amin
    2017 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2017,
  • [42] Hardening Embedded Networking Devices Against Side-Channel Attacks
    Liu, Donggang
    Dong, Qi
    AD HOC & SENSOR WIRELESS NETWORKS, 2011, 12 (1-2) : 103 - 124
  • [43] FPGA implementations of SPRING and their countermeasures against side-channel attacks
    Brenner, Hai
    Gaspar, Lubos
    Leurent, Gaëetan
    Rosen, Alon
    Standaert, François-Xavier
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 414 - 432
  • [44] A Secure D Flip-Flop against Side Channel Attacks
    Vaquie, Bruno
    Tiran, Sebastien
    Maurine, Philippe
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION, AND SIMULATION, 2011, 6951 : 331 - 340
  • [45] S-boxes, Their Computation and Their Protection against Side Channel Attacks
    Carlet, Claude
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : XV - XVII
  • [46] Temporal Power Redistribution as a Countermeasure Against Side-Channel Attacks
    Zooker, David
    Elkoni, Matan
    Shalom, Or Ohev
    Weizman, Yoav
    Levi, Itamar
    Keren, Osnat
    Fish, Alexander
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [47] A Logic Level Countermeasure Against CPA Side Channel Attacks on AES
    Menicocci, Renato
    Trifiletti, Alessandro
    Trotta, Francesco
    MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, MIXDES 2013, 2013, : 403 - 407
  • [48] Formal Verification of Software Countermeasures against Side-Channel Attacks
    Eldib, Hassan
    Wang, Chao
    Schaumont, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2014, 24 (02)
  • [49] An approach for symmetric encryption against side channel attacks in provable security
    Li, Wei
    Gu, Dawu
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 178 - +
  • [50] PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender
    Li, Luyi
    Huang, Jiayi
    Feng, Lang
    Wang, Zhongfeng
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 1509 - 1514