论文标题
关于攻击基于椭圆曲线的身份验证芯片的复杂性
On the Complexity of Attacking Elliptic Curve Based Authentication Chips
论文作者
论文摘要
在本文中,我们讨论了在缺少基本信息时成功攻击加密实施的困难。我们从对自己设计的攻击进行详细描述开始,以突出显示需要哪些信息来增加攻击的成功,即,我们将其用作以下攻击对市售加密货币芯片的攻击。我们想强调,我们对自己的设计的攻击与认证期间发生的事情非常相似。根据常见标准标准,在这种情况下,制造商需要提供详细的信息。在不签署NDA的情况下攻击商业设计时,我们需要深入搜索Internet以获取有关设计的信息。我们无法透露攻击的商业身份验证芯片使用的私钥100%正确。此外,二手键的缺失知识不允许我们评估攻击的成功。我们能够在身份验证过程中揭示有关处理序列的信息,即使详细介绍了处理单个密钥位的时钟周期的详细信息。总结这种攻击的努力明显高于攻击众所周知的实施。
In this paper we discuss the difficulties of mounting successful attack against crypto implementations when essential information is missing. We start with a detailed description of our attack against our own design, to highlight which information is needed to increase the success of an attack, i.e. we use it as a blueprint to the following attack against commercially available crypto chips. We would like to stress that our attack against our own design is very similar to what happens during certification e.g. according to Common Criteria Standard as in those cases the manufacturer needs to provide detailed information. When attacking the commercial designs without signing NDAs, we needed to intensively search the Internet for information about the designs. We cannot to reveal the private keys used by the attacked commercial authentication chips 100% correctly. Moreover, the missing knowledge of the used keys does not allow us to evaluate the success of our attack. We were able to reveal information on the processing sequence during the authentication process even as detailed as identifying the clock cycles in which the individual key bits are processed. To summarize the effort of such an attack is significantly higher than the one of attacking a well-known implementation.