1996-10-23 - A new attack to RSA on tamperproof devices

Header Data

From: deng@iss.nus.sg (Robert Deng)
To: yiqun@rsa.com
Message Hash: f6ad562c3542c9369fa842aa474bb5c7b450b214e384e71f4b4119cdc51057b4
Message ID: <9610230138.AA01250@aquarius.iss.nus.sg>
Reply To: N/A
UTC Datetime: 1996-10-23 01:35:14 UTC
Raw Date: Tue, 22 Oct 1996 18:35:14 -0700 (PDT)

Raw message

From: deng@iss.nus.sg (Robert Deng)
Date: Tue, 22 Oct 1996 18:35:14 -0700 (PDT)
To: yiqun@rsa.com
Subject: A new attack to RSA on tamperproof devices
Message-ID: <9610230138.AA01250@aquarius.iss.nus.sg>
MIME-Version: 1.0
Content-Type: text/plain



              A New Attack to RSA on Tamperproof Devices


                   Feng Bao (baofeng@iss.nus.sg)
                   Robert Deng (deng@iss.nus.sg)
                   Yongfei Han (yfhan@iss.nus.sg)
                   Albert Jeng (jeng@iss.nus.sg)
                   Teow Hin Nagir (teowhin@iss.nus.sg)
                   Desai Narasimhalu (desai@iss.nus.sg)
                  
                     Information Security Group
                     Institute of Systems Science
                     National University of Singapore

                          23rd October 1996


In September 96, Boneh Demillo and Lipton from Bellcore announced a new type 
of cryptanalytic attack against RSA-like public key cryptosystems on tamperproof 
devices such as smart card (see, e.g., http://www.bellcore.com/PRESS/ADVSRY96/
medadv.html). However, due to the sketchiness of the Bellcore attack, it is
impossible to perform a meaningful assessment of this attack until more detailed
information becomes available.

On October 18, Eli Biham and Adi Shamir published their new attack, called 
Differential Fault Analysis (DFA), to secret key cryptosystems, such as DES. 
Some concrete ideas on how this attack works were revealed in their announcement 
(see, e.g., http://jya.com/dfa.htm).

Our work here was motivated first by the Bellcore announcement and then by the 
DFA announcement. We present an attack to RSA on tamperproof devices. At the 
time of writing, we have no idea whether our attack is similar to the Bellcore 
attack. 

We make the following assumption as in the Bellcore and DFA announcements.

Assumption: By exposing a sealed tamperproof device such as a smart card to 
certain physical effects (e.g., ionizing or microwave radiation), one can induce 
with reasonable probability a fault at a random bit location in one of the 
registers at some random intermediate stage in the cryptographic computation.
(We will explain later that our attack also works against multiple bit faults).

Without loss of generality, assume that n=pq in RSA is a 512 bit number. Let e be 
the public exponent which is publicly known and d be the secret exponent which 
is stored inside the tamperproof device. Let P be a plaintext, then the 
corresponding ciphertext is
                              C = P^e                           (1)

(In the following, only residues modulo n are shown, e.g., we use P^e instead 
of P^e mod n). 

We denote the binary representation of the secret exponent as

             d = d511|d510| ...|di|...|d1|d0                    (2)

where di, takes value 1 or 0, is the ith bit and where x|y denotes concatenation 
of x and y. Further, we denote

            C0=C, C1=C^2, C2=C^{2^2}, ..., C511=C^{2^511}       (3)

Given C and d, we can express the corresponding plaintext P as

      P=(C511^d511)(C510^d510)...(Ci^di) ...(C1^d1)(C0^d0)      (4)
       

We assume that the attacker is in physical possession of the tamperproof device 
and that he can repeat the experiment with the same key by applying external 
physical effects to obtain outputs due to single bit errors.

To simplify the description, we illustrate our attack by two examples.

EXAMPLE 1:

Suppose that one bit in the binary representation of d in equation (2) is 
changed from 1 to 0 or vice versa, and that the fault bit position is randomly 
located.

An attacker arbitrarily chooses a plaintext P and computes the ciphertext C 
using (1). He then applies external physical effects to the tamperproof device 
and at the same time asks the device to decrypt C. Assuming that di in (2) is 
changed to its complement di', then the output of the device will be
 
        P'=(C511^d511)(C510^d510)...(Ci^di') ...(C1^d1)(C0^d0)   (5)

Since the attacker possesses P, he can compute 

                     P'/P = Ci^di'/Ci^di                         (6)

Obviously, if P'/P = 1/Ci, then di = 1, and if P'/P = Ci, then di = 0. The attacker 
can re-compute Ci and 1/Ci for i = 0, 1, ..., 511, and compares (6) to these values 
in order to determine one bit of d. The attacker can repeat the above process 
using either the same plaintext/ciphertext pair or using different plaintext/
ciphertext pairs until he obtains enough information to uncover the binary 
representation of the secret exponent d.

EXAMPLE 2:

For the sake of simplicity, here we assume that in decrypting a ciphertext, the 
tamperproof device first computes the data sequence in (3) and then computes (4). 
We also assume that the attacker applies external physical effects to the tamperproof 
device to induce an one bit error in Ci, i = 0, 1, ..., 511. 

Suppose that the one bit error is in Ci, we denote the corrupted value as Ci'. Then 
the output from the tamperproof device is

       P'=(C511^d511)(C510^d510)...(Ci'^di) ...(C1^d1)(C0^d0)     (7)

The attacker can then compute

                       P'/P = Ci'^di/Ci^di = Ci'/Ci               (8)

(Note that di in (8) must be 1.) Suppose that the attacker has computed all the 
possible Ci'/Ci values in advance (there are a total of 512x512 such values) and 
stored them somewhere. Now the attacker can compare all these values with P'/P. 
Once a match is found, the attacker knows i then knows that di is 1. The attacker 
repeats the above process until he has enough information to determine d.

The above examples are just meant to illustrate the basic ideas of our attack. 
Anyway, by the two examples we showed that: One bit fault at certain location and 
time can cause fatal leakage of the secret key. Such leakage gradually increases 
as the above procedures are repeated using one or multiple pairs of P and C.

It should be noted that our attack also works for multiple bit errors. Assuming 
two bit faults and consider the scenario of EXAMPLE 2. The possible Ci'/Ci values 
now increases from 512 x 512 to 512 x 512 x 512. In this case, matching P'/P 
requires more time, while with large possibility you obtain 2 di's once a match
is obtained. 
  
To conclude this research note, we would like to say a few words on how to resist 
this kind of attacks.

1. The attack may be avoided by calculating values 2 times and checking the two 
results. However, this approach doubles the computational time. As pointed out 
by Bellcore, this double computation method also avoids their attack.

2. In many cases, the encryption key e is usually small. So we can verify the result 
by checking 
     
                               P^e= C ?

This approach is much more efficient than the double computation approach if e is 
small.

3. In some protocols for digital signature, a random string is chosen by the smart
card and concatenated to a message m which is to be signed by the smart card. For
example, m is a 412 binary string given to the smart card. The smart card randomly
chooses a 100 bit number r and the output is (C|r)^d. Since r is different each time,
the attack does not work in such case.











Thread