Side-channel attacks can defeat most cryptographic security solutions, but there are ways to protect against them.
A side-channel attack can perhaps best be defined as any attack based on information gained from the physical implementation of a cryptosystem, rather than brute force or theoretical weaknesses in the algorithms.
Put simply, all physical electronic systems routinely leak information about their internal process of computing via their power consumption or electromagnetic emanations. This means attackers can exploit various side-channel techniques to gather data and extract secret cryptographic keys. Whether implemented in hardware or software, and regardless of specific instruction set architecture (ISA), most cryptographic security solutions on the market today can be soundly defeated by side-channel attacks. In some cases, secret keys can be recovered from a single transaction clandestinely performed by a device several feet away.
As YongBin Zhou and DengGuo Feng point out, single-chip devices such as smart cards initially received much attention in the attacker community. This can be attributed to the ubiquity of smart cards in low-end commerce applications and the relatively low cost of such an attack vector. Perhaps not surprisingly, the side-channel landscape has steadily evolved over the years, with attackers now capable of compromising a wide variety of vulnerable targets such as aerospace and defense systems, vehicles, set-top boxes and even implanted medical devices.
As more devices are connected to the Internet of Things (IoT), proactive suppliers have begun to place more of an emphasis on security and now offer integrated countermeasures to their customers. It should be noted that devices without countermeasures are frequently vulnerable to Differential Power Analysis (DPA), a category of noninvasive side-channel attack. Effective DPA resistance cannot be achieved by chance, or even by the default complexity or high clock frequency of a target device. Therefore, measurable and quantifiable security standards, such as those offered by Test Vector Leakage Assessment (TVLA) methodology, are essential to shielding devices and systems from side-channel attacks, as untested and unverified countermeasures are typically ineffective.
Specific DPA countermeasure techniques include decreasing the signal-to-noise ratio of the power side channel by reducing leakage (signal) or increasing noise, for example, by making the amount of power consumed less contingent upon data values and/or operation (balancing); introducing amplitude and temporal noise; incorporating randomness with blinding and masking by randomly altering the representation of secret parameters and implementing protocol-level countermeasures by continually refreshing and updating cryptographic keys used by a device. Device vendors can either implement countermeasures themselves or choose from several commercial software and hardware offerings that provide side-channel resistant for commonly used cryptographic offerings.
For device makers implementing DPA countermeasures, it is recommended that the system and device prototypes be evaluated for resistance to side-channel attacks – such as SPA, CPA, DPA, HO-DPA and their electromagnetic equivalents – before a product is brought to market.
In conclusion, side-channel attacks, such as Simple Power Analysis (SPA) and Differential Power Analysis (DPA) conducted against electronic gear are relatively simple and inexpensive to execute. These noninvasive techniques analyze power consumption while a device is performing routine operations with secret keys and algorithms. As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data. Quantitative testing methodologies, like TVLA (Test Vector Leakage Assessment) should be used to verify the effectiveness of implemented countermeasures.
Leave a Reply