Physical Security: Status and Outlook



Similar documents
Side Channel Analysis and Embedded Systems Impact and Countermeasures

Three-Phase Dual-Rail Pre-Charge Logic

On Security Evaluation Testing

Fault Modeling. Why model faults? Some real defects in VLSI and PCB Common fault models Stuck-at faults. Transistor faults Summary

Hardware Trojans Detection Methods Julien FRANCQ

Unknown Plaintext Template Attacks

Horst Görtz Institute for IT-Security

Identity-based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks

CryptoFirewall Technology Introduction

CHASE Survey on 6 Most Important Topics in Hardware Security

Ensuring Data Storage Security in Cloud Computing

Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001

Power Reduction Techniques in the SoC Clock Network. Clock Power

Reviving smart card analysis

Lecture 9 - Message Authentication Codes

Digital Circuit Design

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Introduction to Digital System Design

Information Leakage in Encrypted Network Traffic

Adversary Modelling 1

Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov

McPAT: An Integrated Power, Area, and Timing Modeling Framework for Multicore and Manycore Architectures

Applying Remote Side-Channel Analysis Attacks on a Security-enabled NFC Tag

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Are Cache Attacks on Public Clouds Practical?

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Pervasive Computing und. Informationssicherheit

System Aware Cyber Security

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

DPA : Attaques et Contre-mesures

Hardware Implementation of AES Encryption and Decryption System Based on FPGA

Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives

An Overview of Common Adversary Models

List of courses MEngg (Computer Systems)

AES implementation on Smart Card

Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin

2 Protocol Analysis, Composability and Computation

VLSI Design Verification and Testing

SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING

Systematization of Knowledge Lessons Learned From SSL/TLS Attacks

PUF Physical Unclonable Functions

These help quantify the quality of a design from different perspectives: Cost Functionality Robustness Performance Energy consumption

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Removing The Linux Routing Cache

Machine Data Analytics with Sumo Logic

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Update On Smart Grid Cyber Security

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Computing on Encrypted Data

Whitewash: Securely Outsourcing Garbled Circuit Generation

How To Perform Differential Frequency Analysis (Dfa) On A Powerline (Aes) On An Iphone Or Ipad (Ase) On Microsoft Powerline 2 (Aces) On Pc Or Ipa (Aas)

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Sleuth: Automated Verification of Software Power Analysis Countermeasures

More effective protection for your access control system with end-to-end security

PLCs and SCADA Systems

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Advanced Threat Protection with Dell SecureWorks Security Services

System-on. on-chip Design Flow. Prof. Jouni Tomberg Tampere University of Technology Institute of Digital and Computer Systems.

A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

SecureCom Mobile s mission is to help people keep their private communication private.

Hardware Trojans: A Threat for CyberSecurity

Secure Way of Storing Data in Cloud Using Third Party Auditor

Lightweight and Secure PUF Key Storage Using Limits of Machine Learning

BY STEVE BROWN, CADENCE DESIGN SYSTEMS AND MICHEL GENARD, VIRTUTECH

A Tutorial on Physical Security and Side-Channel Attacks

Attestation and Authentication Protocols Using the TPM

Making Multicore Work and Measuring its Benefits. Markus Levy, president EEMBC and Multicore Association

Security Analysis for Order Preserving Encryption Schemes

How To Design A Chip Layout

Enova X-Wall LX Frequently Asked Questions

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

CPSC 467b: Cryptography and Computer Security

Computer Security (EDA263 / DIT 641)

Six Strategies for Building High Performance SOA Applications

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Mobile network security report: Poland

Module 1: Introduction to Computer System and Network Validation

Secure Deduplication of Encrypted Data without Additional Independent Servers

Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX

The Classical Architecture. Storage 1 / 36

Implementation Details

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Module 1. Introduction to Software Engineering. Version 2 CSE IIT, Kharagpur

Microsemi Security Center of Excellence

Transcription:

Physical Security: Status and Outlook ECRYPT II: Crypto for 2020 January 22-24, Tenerife, Spain Stefan Tillich

Ideal World P C 2

Real World P C, C,errC 3

Implementation Attacks First publication ~ 16 years ago Exploitation of various physical effects Developing/improving attacks: passive/active, (non/semi-)invasive Countermeasures on various levels: cell, architecture, protocol/construction Evaluation of attack & countermeasure effectiveness 4

Countermeasures Hiding E.g. Noise increase, signal reduction, shuffling / dummy ops, some secure logic styles Masking E.g. First-order/higher-order masking, blinding, some secure logic styles Protocol/Construction E.g. Re-keying, Leakage-resilient crypto 5

Some State-of-the-Art (I) Practical attack capabilities Non-profiled SCA Profiled SCA Algebraic attacks Fault attacks 6

Some State-of-the-Art (II) Evaluation framework Secure logic styles Leakage-resilient crypto Protecting software Protecting processors 7

Practical Capabilities Collection and processing of > 1 billion samples Josh Jaffe, CHES 2010 Reverse engineering of security chips with low/medium cost E.g. Chris Tarnovsky (Flylogic) 8

Non-Profiled SCA DoM, correlation common distinguishers Require reasonable good leakage models Mutual Information Analysis as toolbox 1) Estimate pdf of key-dependent models 2) Test correspondence to actual traces MIA generalized easily for higher-order attacks 9

Statistical View SCA as detecting dependence between two random variables Leakage models (X) E.g. HW(Sbox(x i k)) Actual measurements (Y) 10

Basic Question Does the leakage model allow a meaningful partitioning of the practical leakages? Correct key hypothesis Wrong key hypothesis 11

Distinguishers DoM: Correlation: MIA: 12

Distinguishers Methods for comparing pdfs without explicit pdf estimation E.g. Kolmogorov-Smirnov test, Cramér-von- Mises test For all attacks: The leakage model may not be totally wrong Different resilience handling non-perfect models 13

Profiled SCA Templates as most powerful SCA attacks Suitable for estimating worst-case attack scenario Various techniques Multi-variate Gaussian templates PCA as pre-processing tool Use of stochastic models T-test templates 14

Algebraic Attacks Express input-output relation as Boolean equations with many unknown variables (incl. key) SAT solvers: Use side-channel leakage to assign values to some of the variables Problems to cope with wrong guesses 15

Algebraic Attacks Optimization problem solver: Can use template probabilities directly Avoids problem of wrong guesses Requires more time 16

Fault Attacks Countermeasures normally based on some form of redundancy Redundant data or computation Recent proposals for combined countermeasures (i.e. also vs. SCA) Protecting generic exponentiation 17

Fault-Sensitivity Analysis Targeting not the fault per se but the exact conditions producing the fault In some implementations, these conditions are key dependent 18

Infective Computation Most fault attacks depend on learning faulty ciphertexts Faults in infective computation will garble the ciphertext Can be safely returned without final checks Attacker doesn t learn useful information 19

Evaluation Framework Proposed by Standaert et al. in 2009 Combination of (1) information theoretic (IT) and (2) security metrics (1) How much information about the key leaks (independent of any adversary)? (2) How effective can different adversaries exploit the leakage? 20

Evaluation Framework Applied to evaluate different classes of countermeasures Masking Shuffling (in software implementations) 21

Some lessons learned IT metric allows to capture security against worst-case attacker Standard attacks in practice not enough to assess SCA resistance of a device Higher-order masking requires a certain amount of noise to be effective Simplified shuffling (random start index) can be more vulnerable 22

Secure Logic Styles Goal: Prevent the leakage at the cell level Research started about a decade ago Many different logic styles proposed Some revisions trying to fix shortcomings of proposed logic styles 23

(Some) Secure Logic Styles SABL, CRSABL WDDL, (DWDDL), Separated DDL, Double WDDL, Double WDDL(ASIC) (MCML), DyCML, LSCML, IFLSCML, DDSLL, TPDyCML GF RSL, DRSL (MCMOS), MDPL, imdpl SecLib TDPL DSDRL SAL Asynchronous logic 24

Secure Logic Evaluation Leakage depends on both cell structure and interconnect Evaluation with simulation often insufficient Need to capture low-level effects, e.g. glitches, early evaluation, memory effect Practical evaluation in ASICs costly 25

Secure Logic Implementation EDA tools often do not directly support some of the required functions/constraints e.g. balancing of wire capacitances Usually, extra steps are added to the standard EDA flow e.g. cell substitution, netlist duplication Tools often need to be tricked into doing the necessary steps e.g. fat wire routing 26

Secure Logic Cost Security improvements often bought at a relatively high price Increased development cost / area / power consumption Decreased speed 27

Leakage-Resilient Crypto Idea: Account for physical leakage in cryptographic construction Goal: Provable physical security against broad classes of adversaries 28

Leakage-Resilient Crypto Impossible to prove security against unrestricted physical adversary -> Determine meaningful physical limits for adversary Constructions with various assumptions E.g. λ-bit leakage/iteration, onlycomputation leaks 29

Leakage-Resilient Crypto Not all assumptions correspond with engineering experience Relatively high implementation cost -> Still a gap between theoretic proofs and practice 30

Protected Software Combination of countermeasures First-order masking & shuffling can be attacked Higher-order masking & strong shuffling (random permutation) seems more secure Execution overhead at least several times the original running time Self-modifying code for offloading overhead to precomputation 31

Construction/leakage resilience Fresh re-keying 32

Protecting Processors Non-deterministic execution E.g. NONDET processor (hiding in time) Protected execution unit E.g. Power-Trust processor (masking, leveraging secure logic) 33

μp with Prot. Execution Unit Secure zone Similar to FU Secure logic Rest of μp Largely unchanged Ordinary CMOS Protected by mask 34

Outlook Integrated countermeasures for SCA and fault attacks (More) practical leakage-resilient crypto Leveraging new architectures to implement countermeasures Move to more system-wide view of physical protection 35