Re: Who cares about side-channel attacks?

2008-11-03 Thread Tanja Lange
 Examples of side channel analysis on real systems I however have never
 seen in the field. Any rumors would be highly appreciated.

At Crypto'08 a team from Bochum demonstrated their side-channel attack on 
KeeLoq. There were some theoretical attacks before but the SCA really
broke it. 

KeeLoq is being used by some car manufacturers and by most garage door
manufacturers.

Regards
Tanja

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Who cares about side-channel attacks?

2008-11-02 Thread Peter Gutmann
Wouter Slegers [EMAIL PROTECTED] writes:

Timing analysis is quite possible to pull of in straightforward
implementations as demonstrated over the Internet on OpenSSL prior to their
implementation of blinding (
http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf). But frankly, I have
never heard of such an attack actually being used in the field. Real side
channel analysis (DPA, EMA etc) seems mostly limited to academics and labs,
not the field.

One of the XBox attacks, allowing rollback to a vulnerable kernel, was a
timing attack.  I'd heard it was also tried in some form (unsuccessfully)
against the Wii as part of the breadth-first attack approach.

I'm afraid that the best at this moment is mostly rumors. There is some
knowledge about attacks in the field but it is spread out a lot and the ones
that aggregate this information are not sharing this (it also gives the
attackers a view on what works and what not).

You can see this with the games-console hacking, the attackers try and release
the least amount of information possible so they've got something in reserve
when the countermeasures appear.  In some cases they use attack method A to
find a weakness and then exploit it using unrelated method B, allowing reuse
of method A once B is patched by the vendor.

As I read his story, he eavesdropped the bus between the bridge chip and the
CPU to recover the real bootloader code with the real RC4 key,

Sorry, I was referring to two different attacks in the same sentence, and on
re-reading managed to make the result quite unclear :-).  The timing attack
didn't directly recover the authentication key directly but avoided the need
to know it, thus allowing unauthorised vulnerable kernels to be loaded.

not the incorrect one in the ROM (very nasty trick, kudo's for the Microsoft
development team there ;-) ).

Often the simplest tricks are the most effective, e.g. stick a PGP header on
the data to be protected and the attackers spend forever trying to decrypt it
when in fact the processing function is (in pseudocode):

  seek( file, 16 );// Skip red-herring junk at start
  processData( file );

(the problem with this one was that they memcpy()'d the fixed header on and
the lengths were wrong, but apart from that it would probably have distracted
attackers for some time).

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Who cares about side-channel attacks?

2008-11-01 Thread Ray Dillinger
On Thu, 2008-10-30 at 16:32 +1300, Peter Gutmann wrote:
 Look at the XBox
 attacks for example, there's everything from security 101 lack of
 checking/validation and 1980s MSDOS-era A20# issues through to Bunnie Huang's
 FPGA-based homebrew logic analyser and use of timing attacks to recover device
 keys (oh, and there's an example of a real-world side-channel attack for you),
 there's no rhyme or reason to them, it's just hammer away at everything with
 anything you've got and exploit the first bit that fails.


But isn't that the attacker's job?  We will never arrive at anything
secure - or even *learn* anything about how to build real security - 
if attackers leave any part of it untested or consistently fail to 
try particular approaches.  As far as I can see the acid tests of 
the real world, hammering away with anything they've got, are exactly
the kind of environment that security pros have to design for in the 
long run.  

We should be trying to identify products and implementations that 
hold up under this kind of assault, and then publishing books about 
the design processes and best practices that produced them.  Knowing 
full well that Kerchoff's Principle is alive and well, and that 
the people doing the attacks will be first in line to buy the 
books.  The point is that if the material in the books is any 
good, then having the books shouldn't help them. 

Cipher suites and protocols and proofs and advanced mathematics 
are well and good, but we have to recognize that they are only a 
small part of actually building a secure implementation.  Holding up 
under diverse assault *is* the desired property that we are all 
supposed to be working toward, and this kind of diverse assault 
is exactly the sort of test we need to validate security design 
processes. 

Bear



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Who cares about side-channel attacks?

2008-10-30 Thread Peter Gutmann
Ben Laurie [EMAIL PROTECTED] writes:
Peter Gutmann wrote:
 Given the string of
 attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some
 not-yet-published ones on HDCP devices :-), etc) this is by far the most
 at-risk category because there's a huge incentive to attack them, the result
 affects tens/hundreds of millions of devices, and the attacks are immediately
 and widely actively exploited (modchips/device unlocking/etc, an important
 difference between this and academic proof-of-concept attacks), so this is 
 the
 one where I'd expect the vendors to care most.

But they've all been unlocked using easier attacks, surely?

The published ones seem to be the (relatively) easy ones, but the ones that
have been tried (and either not published or just had the easy outcome
published) have been pretty amazing.  This is another one of these things
where real figures are going to be near-impossible to come by, even harder
than my hypothetical public vendor survey of who uses SCA protection.  You'd
have to read about 20 blogs and a hundred mailing lists, many private, just to
keep up, but from various informal contacts with people working in this area
it seems you're not looking at anything like the conventional identify the
weakest point, then attack there approach.  Instead what's being done is more
like the Iraqi weapons program prior to 1991 where they were using every
imaginable type of approach, including ones like calutrons that had been
abandoned decades earlier by everyone else, for a first-past-the-post finish,
they'd try anything and everything and whatever got them there first would be
declared the winner.  It's the same with these attacks, whenever I've asked
have you tried X the answer is invariably yes, we have.

This style of attack is quite different from the usual academic model, it
neatly illustrates Bruce Schneier's comment that a defender has to defend
every single point along the line while an attacker only has to find a single
weakness.  In this case it seems to be literally true, and the weakness won't
necessarily be the actual weakest point but merely the point where an attacker
with sufficient skill and access to the right tools got in.  Look at the XBox
attacks for example, there's everything from security 101 lack of
checking/validation and 1980s MSDOS-era A20# issues through to Bunnie Huang's
FPGA-based homebrew logic analyser and use of timing attacks to recover device
keys (oh, and there's an example of a real-world side-channel attack for you),
there's no rhyme or reason to them, it's just hammer away at everything with
anything you've got and exploit the first bit that fails.

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Who cares about side-channel attacks?

2008-10-30 Thread Thierry Moreau



Peter Gutmann wrote:


Ben Laurie [EMAIL PROTECTED] writes:


Peter Gutmann wrote:


Given the string of
attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some
not-yet-published ones on HDCP devices :-), etc) this is by far the most
at-risk category because there's a huge incentive to attack them, the result
affects tens/hundreds of millions of devices, and the attacks are immediately
and widely actively exploited (modchips/device unlocking/etc, an important
difference between this and academic proof-of-concept attacks), so this is the
one where I'd expect the vendors to care most.


But they've all been unlocked using easier attacks, surely?



The published ones seem to be the (relatively) easy ones, but the ones that
have been tried (and either not published or just had the easy outcome
published) have been pretty amazing.  This is another one of these things
where real figures are going to be near-impossible to come by, even harder
than my hypothetical public vendor survey of who uses SCA protection.  You'd
have to read about 20 blogs and a hundred mailing lists, many private, just to
keep up, but from various informal contacts with people working in this area
it seems you're not looking at anything like the conventional identify the
weakest point, then attack there approach.  Instead what's being done is more
like the Iraqi weapons program prior to 1991 where they were using every
imaginable type of approach, including ones like calutrons that had been
abandoned decades earlier by everyone else, for a first-past-the-post finish,
they'd try anything and everything and whatever got them there first would be
declared the winner.  It's the same with these attacks, whenever I've asked
have you tried X the answer is invariably yes, we have.

This style of attack is quite different from the usual academic model, it
neatly illustrates Bruce Schneier's comment that a defender has to defend
every single point along the line while an attacker only has to find a single
weakness.  In this case it seems to be literally true, and the weakness won't
necessarily be the actual weakest point but merely the point where an attacker
with sufficient skill and access to the right tools got in.  Look at the XBox
attacks for example, there's everything from security 101 lack of
checking/validation and 1980s MSDOS-era A20# issues through to Bunnie Huang's
FPGA-based homebrew logic analyser and use of timing attacks to recover device
keys (oh, and there's an example of a real-world side-channel attack for you),
there's no rhyme or reason to them, it's just hammer away at everything with
anything you've got and exploit the first bit that fails.



Now you seem to answer the question yourself: SCA protections apply to a 
single class of attacks, while there are many.


Going back to who cares, having done certification consulting 
assignments for some devices with crypto, when there was no 
checklist-based standard to apply, good practice security criteria (to 
be briefly documented in the report) would include the following questions:


(A) Is the secret key inside a device unit applicable to this single 
unit, or is it a system-wide, or domain-wide key?


That's a key management scheme question.

(B) Is the attack destructive? Which device unit features (especially 
be in working order, but also be absent of actual tampering evidence 
or even remain under the control of the legitimate user without 
interruptions longer than X ) need to be impaired for a given class of 
attack to succeed? This question pertains to the secret key as in (A) 
and also to any public-key-to-be-integrity-protected which would prevent 
malicious code download.


That's a product design question.

(C) What are the incentives, if any, for the legitimate user to remain 
well-behaved in the human aspects of device protection? (E.g. a merchant 
has some incentive to maintain a payment authorization device in good 
working order.) This leads to the question of insider threats, so 
satisfactory answers in this area are seldom present.


This is an application design question.

This gives an idea of analyses that drives security-related spendings 
(in my limited experience). Clients (intend to) pay for protections that 
will prevent financial losses and major public relations impacts (and 
then cut operating budgets soon after the project gets its 
authorization!). The consultant study must clearly link attackers' 
motivations to impacts and to countermeasures.


Refinements to the above analysis methodology call for the same creative 
mind that you assume from the part of the attackers. E.g. the usefulness 
of a device unit clone for the attacker should be considered for 
questions (B) and (C).


Does SCA protection enter the picture? Marginally at best.

Regards,


--

- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, Qc
Canada   H2M 2A1

Tel.: (514)385-5691
Fax:  (514)385-5900

web site: 

Re: Who cares about side-channel attacks?

2008-10-27 Thread Ben Laurie
Peter Gutmann wrote:
 In fact none of the people/organisations I queried about this fitted into any 
 of the proposed categories, it was all embedded devices, typically SCADA 
 systems, home automation, consumer electronics, that sort of thing, so it was 
 really a single category which was Embedded systems.  Given the string of 
 attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some 
 not-yet-published ones on HDCP devices :-), etc) this is by far the most 
 at-risk category because there's a huge incentive to attack them, the result 
 affects tens/hundreds of millions of devices, and the attacks are immediately 
 and widely actively exploited (modchips/device unlocking/etc, an important 
 difference between this and academic proof-of-concept attacks), so this is 
 the 
 one where I'd expect the vendors to care most.

But they've all been unlocked using easier attacks, surely?

-- 
http://www.apache-ssl.org/ben.html   http://www.links.org/

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Who cares about side-channel attacks?

2008-10-25 Thread Peter Gutmann
Thierry Moreau [EMAIL PROTECTED] writes:

I find the question should be refined.

It could if there was a large enough repondent base to draw samples from :-). 
This is one of those surveys that can never be done because no vendor will 
publicly talk to you about security measures in their embedded systems.

In fact none of the people/organisations I queried about this fitted into any 
of the proposed categories, it was all embedded devices, typically SCADA 
systems, home automation, consumer electronics, that sort of thing, so it was 
really a single category which was Embedded systems.  Given the string of 
attacks on crypto in embedded devices (XBox, iPhone, iOpener, Wii, some 
not-yet-published ones on HDCP devices :-), etc) this is by far the most 
at-risk category because there's a huge incentive to attack them, the result 
affects tens/hundreds of millions of devices, and the attacks are immediately 
and widely actively exploited (modchips/device unlocking/etc, an important 
difference between this and academic proof-of-concept attacks), so this is the 
one where I'd expect the vendors to care most.

Also, for organizations mandated to comply with IT security 
certification/guidelines/best-practice, a risk analysis is performed to 
keep the auditor at bay, in which SCA protection has very little chance 
of even merely being mentioned. How can the SCA protection mechanism fit 
the risk analysis discipline? I.e., is it possible to even define SCA 
protection in a way that might trigger interest from security 
consultants or their clients?

Actually that's a special case, or more generally having certification/ 
auditing requirements (which a private-email responder also mentioned) is a 
special case in that the risk analysis is now if I don't do this I don't get 
sign-off rather than it makes good security sense to do this so we'll do 
it.  In the immortal words of the Bastard Operator from Hell, when you have 
the audit/certification gun pointed at someone's head you can pretty much 
[get them to] to run naked across campus with a power-cord rammed up [their] 
backside and they'd do it not because they thought it was a terribly good 
idea but because they had a gun pointed at their head.

An associated problem with this is that if vendors are motivated solely by 
checkbox requirements then they'll often ship the product in a non-approved 
mode (coughFIPS140cough) to reduce manufacturing or support costs/increase 
performance/increase ease of use/whatever.  It's a nasty catch-22, hold a gun 
to someone's head and they'll only do what you tell them for as long as the 
gun is applied.

Getting back to the SCADA/home automation/consumer electronics embedded 
market, the only certification that applies is the likes of FCC Class B, ROHS, 
CE, and UL.  This is why I was interested in finding cases (or 
counterexamples) of informed-consent use of SCA countermeasures, because in 
the general embedded-systems case vendor cost/benefit analysis is the only 
deciding factor on whether it gets used or not, and vendors seem to be 
deciding (from my own experience and some private-email replies) that it's not 
worth it.

Peter.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Who cares about side-channel attacks?

2008-10-24 Thread Jack Lloyd
On Mon, Oct 06, 2008 at 05:51:50PM +1300, Peter Gutmann wrote:
 For the past several years I've been making a point of asking users of crypto
 on embedded systems (which would be particularly good targets for side-channel
 attacks, particularly ones that provide content-protection capabilities)
 whether they'd consider enabling side-channel attack (SCA - no, not that SCA)
 protection in their use of crypto.  So far I've never found anyone who's made
[...]

 In other words the user has to make a conscious decision that SCA protection
 is important enough that performance/power consumption can be sacrificed for
 it.  Can anyone provide any data on users making this tradeoff?  And since
 negative results are also results, a response of I've never found anyone who
 cares either is also useful.  Since the information may be commercially

I have little experience on the embedded crypto side but I do maintain
a crypto library that has some non-zero number of users on general
desktop and server machines.

Basic protections ala your point 2 are provided and enabled by default
(blinding, and checking private key operations for consistency with
the public, to prevent the really easy attacks). There used to be a
toggle to disable blinding, which as far as I know was never used - or
at least nobody complained when I removed the toggle.

To my memory nobody has ever asked about what SCA measures are or are
not enabled, or how to toggle them, though I do have a FAQ entry about
it, so perhaps people who really wanted serious side-channel
resistence just read that FAQ and moved on to another implementation
without ever bothering to contact me - certainly there are some
self-selection problems with my sampling.

When FlexSecure wrote Botan's ECC implementation for BSI, they
implemented a number of anti-timing attack countermeasures - but they
were being paid to care about that, so this is probably not a valid
datapoint.

-Jack

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]