Defeating Embedded Cryptographic Protocols by Combining Second-Order with Brute Force
نویسندگان
چکیده
Side-channel analysis is a well-known and efficient hardware technique to recover embedded secrets in microprocessors. Countermeasures relying on random masking have been proven to be sound protections against such threats and are usually added to protect sensitive intermediate data during the algorithm process. However, SecondOrder Side-Channel Analysis have proven to allow secret key recovery in the presence of random masking. In [4] an attack was introduced which exploits the information exchange at the cryptographic protocol level in order to disclose the secret key of the ISO/IEC 9797-1 MAC algorithm 3 using DES operations. A countermeasure suggestion was for a mask to be applied at the protocol level in order to protect all secret data. This paper extends the attack idea previously published to second order attacks on masked implementations of the ISO/IEC 9797-1 MAC algorithm 3 and shows that securing against such attacks must be done with care.
منابع مشابه
Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques
Side-channel analysis is a well-known and efficient hardware technique to recover embedded secrets in microprocessors. Over the past years, the state-of-the-art side-channel attacks has significantly increased, leading to a myriad of vulnerability paths that secure codes must withstand. Nowadays most of the attacks target the cryptographic algorithms, but very few exploit the cryptographic prot...
متن کاملEnhancing the privacy of electronic passports
We address in this paper the problem of privacy in the current architecture in electronic passports for the storage and transmission of biometric data such as fingerprints. The current architecture provides a good protection of biometric personal data but brute force attack could be used in a near future using cloud computing. We propose a new solution combining cryptographic protocols and canc...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملCracking MD5 hashes by simultaneous usage of Multiple GPUs and CPUs over multiple machines in a network
Cryptographic Hash functions find ubiquitous use in various applications like digital signatures, message authentication codes and other forms of security. Their associated vulnerabilities therefore make them a prevalent target for cyber criminals. General means of defeating hash based authentication involves both discovering and exploiting inherent weakness in cryptographic hash functions or b...
متن کاملMitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions
Password-Authenticated Key Exchange allows users to generate a strong cryptographic key based on a shared “human-memorable” password without requiring a public-key infrastructure. It is one of the most widely used and fundamental cryptographic primitives. Unfortunately, mass password theft from organizations is continually in the news and, even if passwords are salted and hashed, brute force br...
متن کامل