Predicting Secret Keys Via Branch Prediction

نویسندگان

  • Onur Aciiçmez
  • Çetin Kaya Koç
  • Jean-Pierre Seifert
چکیده

This paper announces a new software side-channel attack — enabled by the branch prediction capability common to all modern highperformance CPUs. The penalty paid (extra clock cycles) for a mispredicted branch can be used for cryptanalysis of cryptographic primitives that employ a data-dependent program flow. Analogous to the recently described cache-based side-channel attacks our attacks also allow an unprivileged process to attack other processes running in parallel on the same processor, despite sophisticated partitioning methods such as memory protection, sandboxing or even virtualization. In this paper, we will discuss several such attacks for the example of RSA, and experimentally show their applicability to real systems, such asOpenSSLandLinux.Moreover, we will also demonstrate the strength of the branch prediction sidechannel attack by rendering the obvious countermeasure in this context (Montgomery Multiplication with dummy-reduction) as useless. Although the deeper consequences of the latter result make the task of writing an efficient and secure modular exponentiation (or scalar multiplication on an elliptic curve) a challenging task, we will eventually suggest some countermeasures to mitigate branch prediction side-channel attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Predicting Indirect Branches via Data Compression

Branch prediction is a key mechanism used to achieve high performance on multiple issue, deeply pipelined processors. By predicting the branch outcome at the instruction fetch stage of the pipeline, superscalar processors are better able to exploit Instruction Level Parallelism (ILP) by providing a larger window of instructions. However, when a branch is mispredicted, instructions from the misp...

متن کامل

Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses

Performance monitors are provided in modern day computers for observing various features of the underlying microarchitectures. However the combination of underlying microarchitectural features and performance counters lead to sidechannels which can be exploited for attacking cipher implementations. In this paper, to the best of our knowledge we study for the first time, the combination of branc...

متن کامل

Message Recovery via an Efficient Multi-Proxy Signature With Self-certified Keys

Multi-proxy signature (MPS) scheme makes a very important branch of the proxy signature scheme family, as they are applicable in many practical situations. The MPS scheme enables the actual signer to pass on their signing authority to plural proxy signers, where each proxy/delegated signer should contribute together to create a genuine MPS to make the whole thing work. In this work, we shall pr...

متن کامل

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys

We analyze the generation and management of 802.11 group keys. These keys protect broadcast and multicast Wi-Fi traffic. We discovered several issues and illustrate their importance by decrypting all group (and unicast) traffic of a typical Wi-Fi network. First we argue that the 802.11 random number generator is flawed by design, and provides an insufficient amount of entropy. This is confirmed...

متن کامل

Analysis of the SSH Key Exchange Protocol

We provide an analysis of the widely deployed SSH protocol’s key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret key is obtained via a Diffie-Hellman key exchange. Next, a transform is applied to obtain the application keys used by later stages of SSH. We define models, following well-established paradigms, th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006