[148514] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA Key Extraction via Low-Bandwidth Acoustic

daemon@ATHENA.MIT.EDU (Jerry Leichter)
Wed Dec 18 21:26:10 2013

X-Original-To: cryptography@metzdowd.com
From: Jerry Leichter <leichter@lrw.com>
In-Reply-To: <CAMm+Lwh5ZSS2ZqeFZEQyvYtNCUS=9wd7=5Ov3cRseRikqhScLQ@mail.gmail.com>
Date: Wed, 18 Dec 2013 21:24:04 -0500
To: Phillip Hallam-Baker <hallam@gmail.com>
Cc: Alexandre Anzala-Yamajako <anzalaya@gmail.com>,
	Tamzen Cannoy <tamzen@cannoy.org>, Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com


--===============3486592544781916862==
Content-Type: multipart/alternative; boundary="Apple-Mail=_1BACCA9C-AE85-4188-8ED9-6A92D7293395"


--Apple-Mail=_1BACCA9C-AE85-4188-8ED9-6A92D7293395
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=iso-8859-1

On Dec 18, 2013, at 7:50 PM, Phillip Hallam-Baker wrote:
> As a student I was fortunate enough to attend one of Adi Shamir's =
lectures at the university of Waterloo where he talked specifically =
about this problem. It stuck with me and I'm glad to see that an actual =
key recovery attack came out of it.
> Have you trief this out against openssl ? How succesful do you think =
it would be ?
>=20
> I would expect it to work against any crypto code that has not been =
designed to avoid power or RF analysis....
I've only read a very small part of the paper, but ... this isn't true.  =
In fact, the paper comments that the techniques used to block =
traditional RF and power attacks make the acoustic attacks *easier*.  =
(The acoustic attacks, by their nature, operate in a very much lower =
frequency band than traditional attacks.  A side-effect of the =
traditional defenses is to tamp down the irrelevant low-frequency stuff =
while not stopping the low-frequency information they actually need.

They specifically attack a version of PGP which has counter-measures to =
the traditional attacks in place.  Based on their results, later =
versions of PGP are immune.

The attack is a chosen-ciphertext attack against RSA that causes the =
multiplications to hit some repetitive patterns.  It's likely to work, =
with perhaps some modifications, against any implementation that isn't =
hardened in specific ways to protect itself.

The paper is 50+ pages long and will take some time to absorb.  But Adi =
Shamir has come through again.  Where would we be without him?

                                                        -- Jerry


--Apple-Mail=_1BACCA9C-AE85-4188-8ED9-6A92D7293395
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=iso-8859-1

<html><head></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><div>On Dec 18, 2013, at 7:50 PM, Phillip Hallam-Baker =
wrote:</div><blockquote type=3D"cite"><div dir=3D"ltr"><div =
class=3D"gmail_extra"><div class=3D"gmail_quote">
<blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left-width:1px;border-left-color:rgb(204,204,204);border-left=
-style:solid;padding-left:1ex"><div dir=3D"ltr"><div>As a student I was =
fortunate enough to attend one of Adi Shamir's lectures at the =
university of Waterloo where he talked specifically about this problem. =
It stuck with me and I'm glad to see that an actual key recovery attack =
came out of it.<br>


</div>Have you trief this out against openssl ? How succesful do you =
think it would be ?</div></blockquote><div><br></div><div>I would expect =
it to work against any crypto code that has not been designed to avoid =
power or RF analysis....</div>
</div></div></div></blockquote>I've only read a very small part of the =
paper, but ... this isn't true. &nbsp;In fact, the paper comments that =
the techniques used to block traditional RF and power attacks make the =
acoustic attacks *easier*. &nbsp;(The acoustic attacks, by their nature, =
operate in a very much lower frequency band than traditional attacks. =
&nbsp;A side-effect of the traditional defenses is to tamp down the =
irrelevant low-frequency stuff while not stopping the low-frequency =
information they actually need.</div><div><br></div><div>They =
specifically attack a version of PGP which has counter-measures to the =
traditional attacks in place. &nbsp;Based on their results, later =
versions of PGP are immune.</div><div><br></div><div>The attack is a =
chosen-ciphertext attack against RSA that causes the multiplications to =
hit some repetitive patterns. &nbsp;It's likely to work, with perhaps =
some modifications, against any implementation that isn't hardened in =
specific ways to protect itself.</div><div><br></div><div>The paper is =
50+ pages long and will take some time to absorb. &nbsp;But Adi Shamir =
has come through again. &nbsp;Where would we be without =
him?</div><div><br></div><div><div>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp; &nbsp; -- Jerry</div><div><br></div></div></body></html>=

--Apple-Mail=_1BACCA9C-AE85-4188-8ED9-6A92D7293395--

--===============3486592544781916862==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography
--===============3486592544781916862==--

home help back first fref pref prev next nref lref last post