[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
On the Importance of Checking Computations
The Bellcore report, "On the Importance of Checking Computations"
on technical details of fault-based cracking reported in today's FT,
is available at:
http://www.bellcore.com/SMART/index.html
Here's an outline:
On the Importance of Checking Computations
(Extended abstract)
Don Boneh, Richard A. DeMillo, and Richard J. Lipton
Math and Cryptography Research Group, Bellcore
Abstract: We present a theoretical model for breaking various
cryptographic schemes by taking advantage of random hardware
faults. We show how to attack certain implementations of RSA
and Rabin signatures. We also show how various authentication
protocols, such as Fiat-Shamir and Schnoor, can be broken
using hardware faults.
1. Introduction
Transient faults
Latent faults
Induced faults
2. Chinese remainder based implementations
2.1 The RSA system
2.2 RSA's vulnerability to hardware faults
3. Register faults
4. The Fiat-Shamir identification scheme
Theorem 4.1
4.1 A modification of the Fiat-Shamir scheme
5. Attacking Schnoor's identification scheme
Theorem 5.1
6. Breaking other implementations of RSA
Theorem 6.1
7. Protecting against an attack based on hardware faults
8. Summary
References
-----
Registration is required for access. Two formats are available:
Acrobat PDF (112kb) and Postscript PS (86kb).
Before registration, there is a brief "context" at:
http://www.bellcore.com/SMART/secwp.html
Here's the first two paragraphs:
Context for "On the Importance of Checking Computations"
"On the Importance of Checking Computations" describes a
fault-based method for breaking various cryptographic
algorithms and exposes the degree to which computing faults
can compromise information security. Once the authors --
Richard DeMillo, Dan Boneh and Richard Lipton -- articulated
and proved their conceptual breakthrough, they realized that
it might be successful in a wide variety of application
scenarios. Fault-based attacks potentially endanger many
network security products and systems. The paper
summarizes the proof for the basic attack.
Proof for fault-based cryptanalysis builds on the premise that
an adversary can observe a faulty computation that occurs
during cryptographic transactions. The faults that are exploited
can occur at various sublevels within the logic level of a
computing device -- that is, in the switching circuitry where
arithmetic operations are performed or in the register transfer
area where temporary values are stored in memory. The
likelihood of faults occurring is not discussed in the paper.
[Snip balance of Context]