17
Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Embed Size (px)

Citation preview

Page 1: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Wide Collisions in Practice

Xin Ye, Thomas EisenbarthFlorida Atlantic University, USA

10th ACNS 2012- Singapore

Page 2: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Overview

• Side Channel Collision Attacks

• Wide Collisions for AES

• Improving Recognition Rates

• Attack Results

Page 3: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Embedded Systems

• Specific purpose device with computing capabilities

• Constrained resources• Many require security

Page 4: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Side Channel Attacks

… leaks additional information via side channel!e.g. power consumption / EM emanation

AESLeakage

plaintext

ciphertext

0 20 40 60 80 100 120 140 160 180 200

-0.2

-0.1

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

Time

Corr

ela

tion

right key

wrong keys

Page 5: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Collisions in AES

Collision: Querying same S-box value twice

Collision Attack: Exploiting collision detections to recover secret key

S S S S S S SS S S S S S S

y1 y4 = y1

plaintextAdd_Key

Sub_Bytes

S-box 1 S-box 4

Page 6: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Collision Detection

Collisions are highly frequent:– First round: .41 collisions– One encryption: >40 collisions

Detecting collisions is hard:– One encryption: 12 720 comparisons– Probability of a collision: <0.4%– False positive rate of 1%: >120 faulty detections Should minimize false positives

Page 7: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Wide Collisions (I) Two AES encryptions with chosen inputs Same plaintexts except for diagonals! AddRoundKey, SubBytes -> same difference

Page 8: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Wide Collisions (II)

• ShiftRows aligns differences• MixColumns can result in equal bytes

Collision

Page 9: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Wide Collisions (III) 2nd ShiftRows results in equal columns Full column collides until next ShiftRows! 5 predictable S-Box collisions between 2 encryptions!

Full Column Collision

Page 10: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Collision Detection

• Direct Comparison of two power traces• Ideally only compared in leaking regions

(5 s-Boxes and full MixColumns colliding)

Point selection necessary:– Knowledge of implementation or profiling needed

S-box 4 S-boxes (in round 3)

+ S-box in round 2+ Mix Columns

Page 11: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Key Recovery Phase

• 1st byte after 1st MixColumns:

• 4 collisions reduce key candidates from 232 to 1 candidate per diagonal.

• Full key recovery: 16 distinct collisions.

Avoid false positives

Page 12: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Outlier MethodProcedure:

Find overallMean Trace

Locate Outlier Region

Locate Neighboring

Pairs Mean TraceIndividual Trace

Outlier Region

Page 13: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Outlier Method: Details

Two parameters:• Size of outlier region• Admitted distance between

neighboring points

Both influence• Number of detected collisions• Rate of false positives

Tradeoff depends on implementation

Page 14: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Results

Leaking Points Detected Collisions Correct Detections1 (R = 0.9, dmax = 0.3) 127 23.0%4 (R = 0.9, dmax = 0.3) 46 71.1%8 (R = 0.9, dmax = 0.3) 88 93.7%

Wide Collisions stronger, but knowledge of implementation or profiling needed

Blind Templates (+ PCA) are great for device profiling

• Unprotected SW implementation, 8-bit Smart Card• Results on 3000 power traces:

Page 15: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Optimized Collision Detection

• Targeting Wide Collisions– Strong leakage, easier to detect– Requires chosen inputs

• Using Outlier Detection method:– Reduces overall detection of collisions– Minimizes false positives

Page 16: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Conclusion

• Wide collisions yield feasible power based collision attack

• Outlier Method is a helpful tool for decreasing false positive detections

Page 17: Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS 2012- Singapore

Thank you very much for your [email protected]