Historical Overview of Physically Observable Side Channels Flashcards

1
Q

TEMPEST

A

NSA program that looked at physical side channels => looked at not just crypto, but monitors, cables, etc (1st)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SPA

A

simple power analysis. attack on secret-dependent RSA control flow (square and sometimes multiply)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DPA

A

differential power analysis. MUL produces different signal based on inputs. train data to tell between 0 and 1. works well if can send the same msg for training and attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 DPA mitigations

A
  • Exponent randomization (use d1 and d2 instead of secret d)
    =>Attack can still work if it can recover d1 and d2 from a single trace
  • Message randomization (blinding)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Chosen Ciphertext Attacks

A

Attacker picks ciphertext to help determine the exponent, d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Adaptive chosen ciphertext attack

A
  • Multiplying by 0 creates a smaller signal than when multiplying by anything else
  • Want to manipulate the temporary values so that there are a lot of zeros if d is 0 and not a lot of zeros if d is 1
  • Must send a message for each bit of the exponent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-adaptive chosen ciphertext attack

A
  • For window RSA implementation
  • Send a message for each window:
    - Set message so that when wval is x it looks distinctive from all other wvals
  • Need much less attempts than adaptive attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

three mitigations for SC after chosen ciphertext attacks

A
  • exponent randomization
  • message randomization
  • Secret-independent control flow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One&Done

A
  • Can be done in a single trace
  • Can be done outside of BN_mod_mul
  • Attacks BN_is_bit_set ==> harder because length is function is much shorter than a MUL
  • BN_mod_mul is very distinct signal => can isolate BN_is_bit_set
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mitigation for One&Done

A

Use all bits of the window at a time => now the attacker has to distinguish between 2^5 different values in the signal (instead of 0 or 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly