Memory Tampering Attack on Binary GCD Based Inversion Algorithms
Aldaya, Alejandro Cabrera; Brumley, Billy Bob; Sarmiento, Alejandro J.Cabrera; Sánchez-Solano, Santiago (2018)
Aldaya, Alejandro Cabrera
Brumley, Billy Bob
Sarmiento, Alejandro J.Cabrera
Sánchez-Solano, Santiago
2018
International Journal of Parallel Programming
This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:tty-201901141092
https://urn.fi/URN:NBN:fi:tty-201901141092
Kuvaus
Peer reviewed
Tiivistelmä
<p>In the field of cryptography engineering, implementation-based attacks are a major concern due to their proven feasibility. Fault injection is one attack vector, nowadays a major research line. In this paper, we present how a memory tampering-based fault attack can be used to severely limit the output space of binary GCD based modular inversion algorithm implementations. We frame the proposed attack in the context of ECDSA showing how this approach allows recovering the private key from only one signature, independent of the key size. We analyze two memory tampering proposals, illustrating how this technique can be adapted to different implementations. Besides its application to ECDSA, it can be extended to other cryptographic schemes and countermeasures where binary GCD based modular inversion algorithms are employed. In addition, we describe how memory tampering-based fault attacks can be used to mount a previously proposed fault attack on scenarios that were initially discarded, showing the importance of including memory tampering attacks in the frameworks for analyzing fault attacks and their countermeasures.</p>
Kokoelmat
- TUNICRIS-julkaisut [22384]