Presentation | 2018-10-29 Evaluation of Availability on Cache Leakage from OSS-RSA Hayato Mori, Rei Ueno, Junko Takahashi, Yuichi Hayashi, Naohumi Honma, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | In recent years, a new cache attack against RSA encryption using the time difference of operations, named SWL (SWL: Sliding Windows Leak), was reported. This attack is applicable to RSA software using the Sliding Window method for modular exponentiation. By this attack, theoretically, we can reduce the key space up to $10^6$ or less and $2^6$ or less for all the keys of RSA-1024 and, 13% keys of RSA-2048, respectively. On the other hand, in the same attack, it is not always possible to acquire a complete operation sequence fromSWL, and no concrete method for deriving a fully correct operation sequence from a partially acquired operation sequence is not known in the literature. In this paper, we present a method to accurately estimate a complete operation sequence from a partial sequence by dividing the acquired operation sequence into short subsequences called "operation pattern." We also show the effectiveness of the proposed method through experiments using RSA software implemented with common open source software (OSS) of cryptographic operations named Libgcrypt. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Side-Channel Attack / Cache Attack / Flush + Reload / RSA-CRT / Sliding Window |
Paper # | HWS2018-53,ICD2018-45 |
Date of Issue | 2018-10-22 (HWS, ICD) |
Conference Information | |
Committee | HWS / ICD |
---|---|
Conference Date | 2018/10/29(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Kobe Univ. Umeda Intelligent Laboratory |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | HardwareSecurity, etc. |
Chair | Tsutomu Matsumoto(Yokohama National Univ.) / Hideto Hidaka(Renesas) |
Vice Chair | Shinichi Kawamura(Toshiba) / Makoto Ikeda(Univ. of Tokyo) / Makoto Nagata(Kobe Univ.) |
Secretary | Shinichi Kawamura(Kobe Univ.) / Makoto Ikeda(SECOM) / Makoto Nagata(Panasonic) |
Assistant | / Hiroyuki Ito(Tokyo Inst. of Tech.) / Masatoshi Tsuge(Socionext) / Tetsuya Hirose(Kobe Univ.) |
Paper Information | |
Registration To | Technical Committee on Hardware Security / Technical Committee on Integrated Circuits and Devices |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Evaluation of Availability on Cache Leakage from OSS-RSA |
Sub Title (in English) | |
Keyword(1) | Side-Channel Attack |
Keyword(2) | Cache Attack |
Keyword(3) | Flush + Reload |
Keyword(4) | RSA-CRT |
Keyword(5) | Sliding Window |
1st Author's Name | Hayato Mori |
1st Author's Affiliation | Tohoku University(Tohoku Univ.) |
2nd Author's Name | Rei Ueno |
2nd Author's Affiliation | Tohoku University(Tohoku Univ.) |
3rd Author's Name | Junko Takahashi |
3rd Author's Affiliation | NTT secure platform laboratories(NTT) |
4th Author's Name | Yuichi Hayashi |
4th Author's Affiliation | Nara Institute of Science and Technology(naist) |
5th Author's Name | Naohumi Honma |
5th Author's Affiliation | Tohoku University(Tohoku Univ.) |
Date | 2018-10-29 |
Paper # | HWS2018-53,ICD2018-45 |
Volume (vol) | vol.118 |
Number (no) | HWS-272,ICD-273 |
Page | pp.pp.35-40(HWS), pp.35-40(ICD), |
#Pages | 6 |
Date of Issue | 2018-10-22 (HWS, ICD) |