Re: 1024 bit RSA cracked?

2010-03-21 Thread Ben Laurie
On 17/03/2010 05:03, James Muir wrote:
> ** I just had the following realization:  I had assumed that the authors
> were attacking an openssl *server* running on the fpga board, but
> perhaps that is not so.  They don't seem to make that specific claim.
> They claim only to be attacking an "unmodi ed version of the OpenSSL
> library".  It is possible that they only created a toy RSA application
> that generates signatures using the openssl library (i.e. by making
> calls to specific openssl functions).  This would explain why they don't
> discuss message blinding -- because they didn't enable it in their toy
> application!  I suspect that's what they did.  In that case, their
> experimental results say very little about the susceptibility of an
> openssl server to fault attacks.  Wow... if I'm correct, then the
> authors really need to be more clear about exactly what they did.

What everyone said...

Plus ... even with their fix, all they have to do is induce two errors
in quick succession and OpenSSL will spit out the key whole.

In any case, this all seems entirely pointless: in order to mount the
attack, you have to have intimate access to the hardware. In other
words, what they have demonstrated is that DRM doesn't work. Groundbreaking.

Of course, the annoying fall-out is that there will be (already is) a
knee-jerk clamour for us to "fix" OpenSSL. Well, I've got news: securing
anything in the face of an unpredictable CPU seems well beyond the scope
of the OpenSSL project - or any other crypto library I am aware of. I'm
not even sure it's possible.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html   http://www.links.org/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: 1024 bit RSA cracked?

2010-03-17 Thread netsecurity
On Wed, 10 Mar 2010 21:27:06 +0530, Udhay Shankar N 
wrote:
> Anyone know more?
> 
>
http://news.techworld.com/security/3214360/rsa-1024-bit-private-key-encryption-cracked/
> 
> RSA 1024-bit private key encryption cracked
> Researchers find weakness in security system
> 
> By Network World Staff | Network World US
> Published: 13:26 GMT, 05 March 10
> 
> Three University of Michigan computer scientists say they have found a
> way to exploit a weakness in RSA security technology used to protect
> everything from media players to smartphones and ecommerce servers.
> 
> RSA authentication is susceptible, they say, to changes in the voltage
> supply to a private key holder. The researchers   Andrea Pellegrini,
> Valeria Bertacco and Todd Austin - outline their findings in a paper
> titled  Fault-based attack of RSA authentication   to be presented 10
> March at the Design, Automation and Test in Europe conference.
> 
> "The RSA algorithm gives security under the assumption that as long as
> the private key is private, you can't break in unless you guess it.
> We've shown that that's not true," said Valeria Bertacco, an associate
> professor in the Department of Electrical Engineering and Computer
> Science, in a statement.
> 
> The RSA algorithm was introduced in a 1978 paper outlining the
> public-key cryptosystem. The annual RSA security conference is being
> held this week in San Francisco.
> 
> While guessing the 1,000-plus digits of binary code in a private key
> would take unfathomable hours, the researchers say that by varying
> electric current to a secured computer using an inexpensive
> purpose-built device they were able to stress out the computer and
> figure out the 1,024-bit private key in about 100 hours   all without
> leaving a trace.
> 
> The researchers in their paper outline how they made the attack on a
> SPARC system running Linux. They also say they have come up with a
> solution, which involves a cryptographic technique called salting that
> involves randomly juggling a private key's digits.
> 
> The research is funded by the National Science Foundation and the
> Gigascale Systems Research Center.

Interesting, especially since I recently did a security assessment at a
power company. From what I saw I suspect that one might be able to get to
some of their servers in outlying areas that handle smart meters and apply
techniques like this.

Given that they were able to do 1024 in 100 hours, what might it take them
to crack 2048 or 4096?

Regards,

Allen

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com


Re: 1024 bit RSA cracked?

2010-03-17 Thread James Muir
>> "The RSA algorithm gives security under the assumption that as long as
>> the private key is private, you can't break in unless you guess it.
>> We've shown that that's not true," said Valeria Bertacco, an associate
>> professor in the Department of Electrical Engineering and Computer
>> Science, in a statement.
> 
> They're not the first ones to show that!  Side-channel attacks have been
> around for a while now.  It's not just the algorithms, but the machine
> executing them and its physical characteristics that matter.

I agree. I think the paper overstates its novelty and implications.  It
seems to be an experimental implementation of a fault attack presented
by Boneh, DeMillo and Lipton (i.e. where it is assumed that single bit
errors affect the private exponent).  They target _some_ crypto
application** that uses the openssl library running on an fpga board.
Getting the attack to work in real life is no small feat, so they
deserve props for that, but they make a few questionable claims -- e.g.
they seem to state that the left-to-right fixed-window exponentiation
algorithm was thought to be immune to fault attacks.  In fact, adapting
the BDL attack, which was presented against a right-to-left algorithm,
to work against a left-to-right algorithm is straightforward, and so the
susceptibility of the left-to-right FWE algorithm has been known for
some time.

What I find much more strange about the paper is that the authors make
no mention of message blinding.  I could be wrong, but message blinding
would defeat their attack.  By default, an openssl server utilizes
message blinding in its private key operations, so there attack wouldn't
apply...

** I just had the following realization:  I had assumed that the authors
were attacking an openssl *server* running on the fpga board, but
perhaps that is not so.  They don't seem to make that specific claim.
They claim only to be attacking an "unmodified version of the OpenSSL
library".  It is possible that they only created a toy RSA application
that generates signatures using the openssl library (i.e. by making
calls to specific openssl functions).  This would explain why they don't
discuss message blinding -- because they didn't enable it in their toy
application!  I suspect that's what they did.  In that case, their
experimental results say very little about the susceptibility of an
openssl server to fault attacks.  Wow... if I'm correct, then the
authors really need to be more clear about exactly what they did.

-James



signature.asc
Description: OpenPGP digital signature


Re: 1024 bit RSA cracked?

2010-03-16 Thread Nicolas Williams
On Wed, Mar 10, 2010 at 09:27:06PM +0530, Udhay Shankar N wrote:
> Anyone know more?
> 
> http://news.techworld.com/security/3214360/rsa-1024-bit-private-key-encryption-cracked/

My initial reaction from reading only the abstract and parts of the
introduction is that the authors are talking about attacking hardware
that implements RSA (say, a cell phone) by injecting faults into the
system via the power supply of the device.

This isn't really applicable to server hardware in a data center (where
the power, presumably, will be conditioned and physical security will be
provided, also presumably) but this attack is definitely applicable to
portable devices -- laptops, mobiles, smartcards.

> "The RSA algorithm gives security under the assumption that as long as
> the private key is private, you can't break in unless you guess it.
> We've shown that that's not true," said Valeria Bertacco, an associate
> professor in the Department of Electrical Engineering and Computer
> Science, in a statement.

They're not the first ones to show that!  Side-channel attacks have been
around for a while now.  It's not just the algorithms, but the machine
executing them and its physical characteristics that matter.

Nico
-- 

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majord...@metzdowd.com