Why Cryptography Should Not Rely on Physical Attack Complexity (T-Labs Series in Telecommunication Services)
暫譯: 為什麼密碼學不應依賴於物理攻擊的複雜性 (T-Labs 電信服務系列)

Juliane Krämer

相關主題

商品描述

This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated.

First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two independent precise faults in a single pairing computation, it has not been taken seriously either.

Based on these two attacks, the book demonstrates that the assessment of physical attack complexity is error-prone, and as such cryptography should not rely on it. Cryptographic technologies have to be protected against all physical attacks, whether they have already been successfully implemented or not. The development of countermeasures does not require the successful execution of an attack but can already be carried out as soon as the principle of a side channel or a fault attack is sufficiently understood.

商品描述(中文翻譯)

這本書介紹了兩種實用的物理攻擊。它展示了攻擊者如何根據這些攻擊揭示對稱和非對稱加密算法的秘密金鑰,並提出了可以幫助未來防止這些攻擊的軟體和硬體層面的對策。儘管這些理論已經被知曉多年,但由於這兩種攻擊尚未在實踐中成功實施,因此通常不被視為嚴重威脅。簡而言之,它們的物理攻擊複雜性被高估,而所隱含的安全威脅則被低估。

首先,書中介紹了光子側信道,它不僅提供時間解析度,還提供最高可能的空間解析度。由於其初始實施的高成本,這一點並未受到重視。該研究展示了簡單和差分光子側信道分析。接著,它提出了一種針對基於配對的加密技術的故障攻擊。由於在單次配對計算中需要至少兩個獨立的精確故障,因此這一攻擊也未受到重視。

基於這兩種攻擊,書中證明了物理攻擊複雜性的評估容易出錯,因此加密技術不應依賴於此。加密技術必須防範所有物理攻擊,無論這些攻擊是否已經成功實施。對策的開發不需要攻擊的成功執行,而是可以在側信道或故障攻擊的原理被充分理解後就開始進行。