12. Side Channel Attacks Flashcards

1
Q

modern threat model

A
  1. bypass strong cryptography
  2. bypass access privileges and authentication protocols
  3. observe physical variables
    - sound
    - voltage
    - current
    - EM radiation

eg.
arduino Uno uses AES-128
AES-128 has 10 rounds of operation
using oscilloscope, able to map wave to operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

observing physical variables

A
  1. passive –> use sensor to monitor
    - timings
    - power consumption
    - EM radiation
    - sound, temperature
  2. invasive
    - micro probing –> probe bus, read data directly
    - circuit modification –> override security measures
    - photonic emissions
    - attacks are effective but costly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

side channel attacks

A
  1. based on information gained from physical implementation of system
  2. information is leaked unintentionally
  3. does not depend on theoretical weakness in application or algorithm
  4. not constrained by access privileges
  5. requires expensive test environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 types of side channel attacks

A
  1. power consumption analysis

2. timing analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

power consumption analysis

A

different power consumption when running, 0s and 1s
power consumption is related to operation and algorithm
2 main techniques
- simple power analysis
- differential power analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

simple power analysis

A
  1. pump in known input
  2. observe output
  3. measure fluctuation in power consumption across a resistor or capacitor(reduce noise)

operation is in attacker control
protection is tamper proof

eg.
find patterns in the graph
match with numerical operation
match with instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hamming weight model

A
  1. binary 0s and 1s have different power consumption
  2. 1s uses more power
  3. binary with the most 1s should have highest voltage
    4 easier to guess which binary number has which voltage

eg.

  1. 15 00001111
  2. 25 00011111

when making jump –> access memory location –> semiconductor –> more power used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Differential power analysis

A
  1. when key guess is correct, spike in power
  2. take samples to reduce noise
  3. as many samples are needed, use software to collate, measure, provide statistical correction

guesses one bit at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Timing analysis attack

A
  1. learn the system secret by observing how long it takes to perform computation
  2. goal is to extract private key
  3. extremely powerful as isolation does not help
    - target could be remote, inside VM, tamper proof
  4. attacker simply monitor input and output response time

able to guess

  • bypass operations
  • RAM hit/miss
  • processor instructions
  • algorithms
  • command sequences
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Timing analysis attack: keystrokes

A
  1. focus on touch typing (standard time patterns in typing passwords)
  2. data collection
    - pick one random password and ask user to type
    - need large sample
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Countermeasures for time analysis attack

A

switch off echo mode –> user typing can still be measured on client-side

randomise timing of keystrokes

set echo delay to be constant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly