DOI: 10.1007/978-3-540-79263-5_16
|View full text |Cite
|
Sign up to set email alerts
|

A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL

Abstract: MicroArchitectural Analysis (MA) techniques, more specifically Simple Branch Prediction Analysis (SBPA) and Instruction Cache Analysis, have the potential of disclosing the entire execution flow of a software-implemented cryptosystem ([5,2]). In this paper we will show that one can completely break RSA in the original unpatched OpenSSL version (v.0.9.8e) even if the most secure configuration is in place, including all countermeasures against side-channel and MicroArchitectural analysis (in particular, base bli… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0
1

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 70 publications
(78 citation statements)
references
References 23 publications
0
77
0
1
Order By: Relevance
“…Consequently, an attacker process that can trace the execution of the square-and-multiply exponentiation algorithm can recover the exponent [2,45,47]. We now show how we can attack this algorithm using the technique developed in Section IV.…”
Section: A Square-and-multiply Exponentiationmentioning
confidence: 99%
“…Consequently, an attacker process that can trace the execution of the square-and-multiply exponentiation algorithm can recover the exponent [2,45,47]. We now show how we can attack this algorithm using the technique developed in Section IV.…”
Section: A Square-and-multiply Exponentiationmentioning
confidence: 99%
“…Our approach is low cost, and it draws upon earlier work in quelling control and data timing leakage, but 2 A control hammock is a CFG construct where control diverges from a single point based on a predicate and then reconverges again to a single point. This construct is typically formed by IF and SWITCH statements.…”
Section: B Eliminating Timing Attacks With Ozonementioning
confidence: 99%
“…Examples of resource sharing timing side-channel attacks include L1 instruction cache based attacks [2], L1 data cache based attacks [20], branch predictor based attacks [1] and most recently last-level cache based attacks [17], [25].…”
Section: Resource Sharingmentioning
confidence: 99%
“…Aciiçmez and Schindler [1] demonstrate that not only data cache, but also instruction cache attacks are also effective. Over the last decade, researchers have developed abstract models of cryptography that capture side-channels, and developed constructions that are secure in these models, see e.g.…”
Section: Related Workmentioning
confidence: 99%