2019 IEEE European Symposium on Security and Privacy (EuroS&P) 2019
DOI: 10.1109/eurosp.2019.00035
|View full text |Cite
|
Sign up to set email alerts
|

Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL

Abstract: In this paper, we describe several practically exploitable fault attacks against OpenSSL's implementation of elliptic curve cryptography, related to the singular curve point decompression attacks of Blömer and Günther (FDTC2015) and the degenerate curve attacks of Neves and Tibouchi (PKC 2016). In particular, we show that OpenSSL allows to construct EC key files containing explicit curve parameters with a compressed base point. A simple single fault injection upon loading such a file yields a full key recovery… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 43 publications
0
7
0
Order By: Relevance
“…This was crucial in establishing an encrypted connection between the sensor nodes and the database, protecting the privacy and security of the collected data. To ensure confidential exchanges, we made use of a dual encryption method, generating SSL keys (both public and private) with the help of RSA-2048 48 . Additionally, AES-256 49 was implemented to guarantee a high level of security for stored information.…”
Section: Ssnmentioning
confidence: 99%
“…This was crucial in establishing an encrypted connection between the sensor nodes and the database, protecting the privacy and security of the collected data. To ensure confidential exchanges, we made use of a dual encryption method, generating SSL keys (both public and private) with the help of RSA-2048 48 . Additionally, AES-256 49 was implemented to guarantee a high level of security for stored information.…”
Section: Ssnmentioning
confidence: 99%
“…Nonetheless, the practical difference between the methods in IEEE and Dragonfly seems negligible given that the probability of an "invalid" output occurring by chance is negligible. (However, it is unclear if an attack action, e.g., fault injection [95], could significantly increase the probability of the "invalid" case. )…”
Section: Class-2: Password-derived Generatormentioning
confidence: 99%
“…Following this path, IEEE 1363.2 [51] generalized its SPEKE spec to allow short exponents as in DSA groups, resulting in changing 𝑓 (as noted in §3.2) to 𝑓 = 𝐻 (𝑤) 𝑘 mod 𝑝; again 𝑝 = 𝑘 • 𝑞 + 1 and 𝑘 is a co-factor. Compared with a safe-prime modulus, the probability for getting an "invalid" output by chance in a DSA group (same modulus size) increases, but remains negligible (without considering attack actions like fault injection [95]). However, in a DSA group, it now requires one exponentiation to validate a received public key.…”
Section: Long and Short Exponentsmentioning
confidence: 99%
“…The first model considered is the skip instruction that was applied successfully in practice on RSA exponentiation with a spike injection on a microcontroller to skip a squaring [31]. It was also recently applied in the elliptic curve point decompression algorithm to make a point lie on weak curve [5,36].…”
Section: Realization Of the Fault Attackmentioning
confidence: 99%