the local attack cryptanalysis of the authenticated
play

The LOCAL attack: Cryptanalysis of the authenticated encryption - PowerPoint PPT Presentation

The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE Dmitry Khovratovich and Christian Rechberger University of Luxembourg and DTU (Denmark) Presented by Yu Sasaki (NTT, Japan) 15 August 2013 Authenticated encryption


  1. The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE Dmitry Khovratovich and Christian Rechberger University of Luxembourg and DTU (Denmark) Presented by Yu Sasaki (NTT, Japan) 15 August 2013

  2. Authenticated encryption

  3. Authenticated encryption Authenticated encryption — a single-key construction that achieves both confidentiality and data integrity. Data integrity/authentication means that a decryptable ciphertext must have been produced with a secret key. Hence most ciphertexts must decrypt to ⊥ .

  4. Authenticated encryption Authenticated encryption — a single-key construction that achieves both confidentiality and data integrity. Data integrity/authentication means that a decryptable ciphertext must have been produced with a secret key. Hence most ciphertexts must decrypt to ⊥ . Several types: • Modes of operation (OCB, EAX, CCM, GCM), which invoke an arbitrary blockcipher; • Dedicated constructions (Helix/Phelix, Grain128a), which use fixed components. Both use nonces to achieve confidentiality in the presence of repeated queries or blocks.

  5. Authenticated encryption Authenticated encryption — a single-key construction that achieves both confidentiality and data integrity. Data integrity/authentication means that a decryptable ciphertext must have been produced with a secret key. Hence most ciphertexts must decrypt to ⊥ . Several types: • Modes of operation (OCB, EAX, CCM, GCM), which invoke an arbitrary blockcipher; • Dedicated constructions (Helix/Phelix, Grain128a), which use fixed components. Both use nonces to achieve confidentiality in the presence of repeated queries or blocks. Furthermore, some input must be authenticated but not encrypted (e.g., routing information). It is called associated data (AD).

  6. Authenticated encryption with associated data Encryption: E : K × N × A × M → C Decryption: D : K × N × A × C → M ∪ {⊥} . AD Message Nonce encrypt and authenticate authenticate and bind A M use and transmit N E K A C T N Confidentiality: • Ciphertexts indistinguishable from random strings; Data integrity: • Most of seemingly valid ciphertexts decrypt to ⊥ .

  7. Breaking AE Find an attack that violate any security property.

  8. Breaking AE Find an attack that violate any security property. In our case — forgery attack, i.e. constructing a ciphertext that decrypts to M � = ⊥ .

  9. Breaking AE In our case, (existential) forgery attack means: • We are given access to the encryption oracle [ message M ] × [ nonce N ] − → [ ciphertext+tag C ] ; • Note that C has some redundancy: most seemingly valid ciphertexts are not decryptable. • Ask C = E K ( M , N ) (we ignore associated data); • Construct C ′ such that D K ( C ′ ) = M ′ � = ⊥ .

  10. ALE Initialization phase Associated data phase K K 2 K 1 N AES Extended key schedule K S 1 AES AES AES 0 AES AES 4 rounds 4 rounds 4 rounds A 1 A 2 A r Message processing phase Extended key schedule K AES AES AES AES AES 4 rounds 4 rounds 4 rounds 4 rounds AES 4 rounds leak leak leak leak 10 127 M 1 M 2 M t T C 1 C 2 C t

  11. ALE and LEX LEX stream cipher K K K K AES AES AES AES AES 10 rounds 10 rounds 10 rounds 10 rounds 10 rounds leak leak leak leak M 1 M 2 M t C 1 C 2 C t Two crucial differences: key schedule and message injection ALE scheme Extended key schedule AES AES AES AES AES 4 rounds 4 rounds 4 rounds 4 rounds 4 rounds leak leak leak leak M 1 M 2 M t C 1 C 2 C t The latter helps.

  12. Leakage under scope Bytes are extracted just after SubBytes operation: M 1 M 2 SR SR SR SR MC MC MC MC AK,SB AK,SB AK,SB AK,SB AK Hence differential properties of the internal state are partly known.

  13. Main idea I Make a local collision in the state: Extended key schedule AES AES AES AES AES 4 rounds 4 rounds 4 rounds 4 rounds 4 rounds leak leak leak leak M 1 M 2 M t C 1 C 2 C t Hence the same tag for a fresh ciphertext.

  14. Main idea II We know the extracted bytes and how a difference would go through it ∆ 1 ∆ 2 #1 #2 #3 #4 SR SR SR SR MC MC MC MC AK,SB AK,SB AK,SB AK,SB AK

  15. Unknowns 25 total active S-boxes, only 17 unknown: ∆ 1 ∆ 2 #1 #2 #3 #4 SR SR SR SR MC MC MC MC AK,SB AK,SB AK,SB AK,SB AK

  16. Construction Start in the middle, assume highest differential probability 2 − 6 everywhere: ∆ 1 ∆ 2 #1 #2 #3 #4 SR SR SR SR MC MC MC MC AK,SB AK,SB AK,SB AK,SB AK Given output differences, construct a colliding ciphertext (hence a forgery) with probability 2 − 102 .

  17. Complexity • The designers put the upper bound 2 40 on the data encrypted on a single key. • Thus we use other trails if we want to stick to the same message. • Total 2 119 attempts before the first forgery, if only one message is known (data/complexity tradeoff).

  18. Two consecutive forgeries for the same message yield state recovery: First forgery M 2 M 3 Second forgery M 1 M 2 State recovery M 2 C 0 C 1 SR SB MC State recovered State recovered in the second forgery K a K b in the first forgery

  19. Results Data Verification attempts Memory Security claim Forgery 2 102 2 102 negl. not violated 2 40 2 110 negl. violated 2 119 1 negl. violated 1 1 negl. violated, success rate 2 − 119 State recovery 2 120 1 negl. violated

  20. Strengthening ALE. Can we prevent the attack by just adding one more round?

  21. 5-round attack Not really. 5-round trail ∆ 1 ∆ 2 #1 #2 #3 #4 #5 SR SR SR SR SR MC MC MC MC MC AK,SB AK,SB AK,SB AK,SB AK,SB AK High data complexity (2 80 ), but still a gain over brute force.

  22. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend