首页 > 最新文献

IACR Trans. Cryptogr. Hardw. Embed. Syst.最新文献

英文 中文
Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs 面向高效zksnark的定点多标量乘法加速
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.358-380
Guiwen Luo, Shihui Fu, G. Gong
The arithmetic of computing multiple scalar multiplications in an elliptic curve group then adding them together is called multi-scalar multiplication (MSM). MSM over fixed points dominates the time consumption in the pairing-based trusted setup zero-knowledge succinct non-interactive argument of knowledge (zkSNARK), thus for practical applications we would appreciate fast algorithms to compute it. This paper proposes a bucket set construction that can be utilized in the context of Pippenger’s bucket method to speed up MSM over fixed points with the help of precomputation. If instantiating the proposed construction over BLS12-381 curve, when computing n-scalar multiplications for n = 2e (10 ≤ e ≤ 21), theoretical analysis ndicates that the proposed construction saves more than 21% computational cost compared to Pippenger’s bucket method, and that it saves 2.6% to 9.6% computational cost compared to the most popular variant of Pippenger’s bucket method. Finally, our experimental result demonstrates the feasibility of accelerating the computation of MSM over fixed points using large precomputation tables as well as the effectiveness of our new construction.
在椭圆曲线群中计算多个标量乘法并将其相加的算法称为多标量乘法(MSM)。不动点上的MSM在基于配对的可信设置零知识简洁非交互式知识论证(zkSNARK)中占主导地位,因此对于实际应用,我们希望快速的算法来计算它。本文提出了一种桶集构造方法,可以在Pippenger桶法的背景下,借助预计算来加速不动点上的MSM。如果在BLS12-381曲线上实例化所提出的构造,当计算n = 2e(10≤e≤21)的n个标量乘法时,理论分析表明,所提出的构造比Pippenger的桶法节省21%以上的计算成本,比Pippenger的桶法最流行的变体节省2.6% ~ 9.6%的计算成本。最后,我们的实验结果证明了使用大型预计算表加速不动点上MSM计算的可行性以及我们的新结构的有效性。
{"title":"Speeding Up Multi-Scalar Multiplication over Fixed Points Towards Efficient zkSNARKs","authors":"Guiwen Luo, Shihui Fu, G. Gong","doi":"10.46586/tches.v2023.i2.358-380","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.358-380","url":null,"abstract":"The arithmetic of computing multiple scalar multiplications in an elliptic curve group then adding them together is called multi-scalar multiplication (MSM). MSM over fixed points dominates the time consumption in the pairing-based trusted setup zero-knowledge succinct non-interactive argument of knowledge (zkSNARK), thus for practical applications we would appreciate fast algorithms to compute it. This paper proposes a bucket set construction that can be utilized in the context of Pippenger’s bucket method to speed up MSM over fixed points with the help of precomputation. If instantiating the proposed construction over BLS12-381 curve, when computing n-scalar multiplications for n = 2e (10 ≤ e ≤ 21), theoretical analysis ndicates that the proposed construction saves more than 21% computational cost compared to Pippenger’s bucket method, and that it saves 2.6% to 9.6% computational cost compared to the most popular variant of Pippenger’s bucket method. Finally, our experimental result demonstrates the feasibility of accelerating the computation of MSM over fixed points using large precomputation tables as well as the effectiveness of our new construction.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"12 1","pages":"358-380"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88067872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform 拨弄旋转常数——数论变换的故障注入分析
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.447-481
P. Ravi, Bolin Yang, S. Bhasin, Fan Zhang, A. Chattopadhyay
In this work, we present the first fault injection analysis of the Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms (KEMs) and digital signature schemes. We identify a critical single fault vulnerability in the NTT, which severely reduces the entropy of its output. This in turn enables us to perform a wide-range of attacks applicable to lattice-based KEMs as well as signature schemes. In particular, we demonstrate novel key recovery and message recovery attacks targeting the key generation and encryption procedure of Kyber KEM. We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. All proposed exploits are demonstrated with high success rate using electromagnetic fault injection on optimized implementations of Kyber and Dilithium, from the open-source pqm4 library on the ARM Cortex-M4 microcontroller. We also demonstrate that our proposed attacks are capable of bypassing concrete countermeasures against existing fault attacks on lattice-based KEMs and signature schemes. We believe our work motivates the need for more research towards development of countermeasures for the NTT against fault injection attacks.
在这项工作中,我们首次提出了数论变换(NTT)的故障注入分析。NTT是一种积分计算单元,广泛用于多种基于结构化格的密钥封装机制(kem)和数字签名方案中的多项式乘法运算。我们在NTT中识别了一个关键的单故障漏洞,这严重降低了其输出的熵。这反过来又使我们能够执行适用于基于格的kem以及签名方案的广泛攻击。我们特别展示了针对Kyber KEM密钥生成和加密过程的新型密钥恢复和消息恢复攻击。我们还提出了针对确定性和概率签名过程的存在伪造攻击,以及针对其验证过程的验证绕过攻击。所有提出的漏洞都通过电磁故障注入在Kyber和diilithium的优化实现上进行了高成功率的验证,这些漏洞来自ARM Cortex-M4微控制器上的开源pqm4库。我们还证明了我们提出的攻击能够绕过针对基于格的kem和签名方案的现有故障攻击的具体对策。我们相信我们的工作激发了对NTT针对故障注入攻击的对策开发的更多研究的需求。
{"title":"Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform","authors":"P. Ravi, Bolin Yang, S. Bhasin, Fan Zhang, A. Chattopadhyay","doi":"10.46586/tches.v2023.i2.447-481","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.447-481","url":null,"abstract":"In this work, we present the first fault injection analysis of the Number Theoretic Transform (NTT). The NTT is an integral computation unit, widely used for polynomial multiplication in several structured lattice-based key encapsulation mechanisms (KEMs) and digital signature schemes. We identify a critical single fault vulnerability in the NTT, which severely reduces the entropy of its output. This in turn enables us to perform a wide-range of attacks applicable to lattice-based KEMs as well as signature schemes. In particular, we demonstrate novel key recovery and message recovery attacks targeting the key generation and encryption procedure of Kyber KEM. We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. All proposed exploits are demonstrated with high success rate using electromagnetic fault injection on optimized implementations of Kyber and Dilithium, from the open-source pqm4 library on the ARM Cortex-M4 microcontroller. We also demonstrate that our proposed attacks are capable of bypassing concrete countermeasures against existing fault attacks on lattice-based KEMs and signature schemes. We believe our work motivates the need for more research towards development of countermeasures for the NTT against fault injection attacks.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"16 1","pages":"447-481"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75866553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . 从SCA的角度看乱码电路:免费的异或可能相当昂贵。
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.54-79
I. Levi, Carmit Hazay
Garbling schemes, invented in the 80’s by Yao (FOCS’86), have been a versatile and fundamental tool in modern cryptography. A prominent application of garbled circuits is constant round secure two-party computation, which led to a long line of study of this object, where one of the most influential optimizations is Free-XOR (Kolesnikov and Schneider ICALP’08), introducing a global offset Δ for all garbled wire values where XOR gates are computed locally without garbling them. To date, garbling schemes were not studied per their side-channel attacks (SCA) security characteristics, even though SCA pose a significant security threat to cryptographic devices. In this research we, demonstrate that adversaries utilizing advanced SCA tools such as horizontal attacks, mixed with advanced hypothesis building and standard (vertical) SCA tools, can jeopardize garbling implementations.Our main observation is that garbling schemes utilizing a global secret Δ open a door to quite trivial side-channel attacks. We model our side-channel attacks on the garbler’s device and discuss the asymmetric setting where various computations are not performed on the evaluator side. This enables dangerous leakage extraction on the garbler and renders our attack impossible on the evaluator’s side.Theoretically, we first demonstrate on a simulated environment, that such attacks are quite devastating. Concretely, our attack is capable of extracting Δ when the circuit embeds only 8 input non-linear gates with fifth/first-order attack Success-Rates of 0.65/0.7. With as little as 3 such gates, our attack reduces the first-order Guessing Entropy of Δ from 128 to ∼ 48-bits. We further demonstrate our attack via an implementation and power measurements data over an STM 32-bit processor software implementing circuit garbling, and discuss their limitations and mitigation tactics on logical, protocol and implementation layers.
在80年代由Yao (FOCS ' 86)发明的乱码方案已经成为现代密码学中通用的基本工具。乱码电路的一个突出应用是恒定轮安全两方计算,这导致了对该对象的长期研究,其中最具影响力的优化之一是Free-XOR (Kolesnikov和Schneider ICALP ' 08),为所有乱码导线值引入全局偏移Δ,其中XOR门在本地计算而不乱码。迄今为止,尽管SCA对加密设备构成了严重的安全威胁,但还没有根据其侧信道攻击(SCA)的安全特征对乱码方案进行研究。在本研究中,我们演示了攻击者利用高级SCA工具(如水平攻击)与高级假设构建和标准(垂直)SCA工具相结合,可能危及乱码实现。我们的主要观察是,利用全局秘密Δ的乱码方案为相当微不足道的侧信道攻击打开了一扇门。我们对加码器设备上的侧信道攻击进行了建模,并讨论了不对称设置,其中在评估器侧不执行各种计算。这使得在加码器上进行危险的泄漏提取,并使我们的攻击无法在求值器方面进行。从理论上讲,我们首先在模拟环境中证明,这种攻击是相当具有破坏性的。具体来说,当电路只嵌入8个输入非线性门时,我们的攻击能够提取Δ,五阶/一阶攻击成功率为0.65/0.7。只需3个这样的门,我们的攻击将Δ的一阶猜测熵从128位降低到~ 48位。我们通过在STM 32位处理器软件上实现电路乱码的实现和功率测量数据进一步演示了我们的攻击,并讨论了它们在逻辑、协议和实现层上的局限性和缓解策略。
{"title":"Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. .","authors":"I. Levi, Carmit Hazay","doi":"10.46586/tches.v2023.i2.54-79","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.54-79","url":null,"abstract":"Garbling schemes, invented in the 80’s by Yao (FOCS’86), have been a versatile and fundamental tool in modern cryptography. A prominent application of garbled circuits is constant round secure two-party computation, which led to a long line of study of this object, where one of the most influential optimizations is Free-XOR (Kolesnikov and Schneider ICALP’08), introducing a global offset Δ for all garbled wire values where XOR gates are computed locally without garbling them. To date, garbling schemes were not studied per their side-channel attacks (SCA) security characteristics, even though SCA pose a significant security threat to cryptographic devices. In this research we, demonstrate that adversaries utilizing advanced SCA tools such as horizontal attacks, mixed with advanced hypothesis building and standard (vertical) SCA tools, can jeopardize garbling implementations.Our main observation is that garbling schemes utilizing a global secret Δ open a door to quite trivial side-channel attacks. We model our side-channel attacks on the garbler’s device and discuss the asymmetric setting where various computations are not performed on the evaluator side. This enables dangerous leakage extraction on the garbler and renders our attack impossible on the evaluator’s side.Theoretically, we first demonstrate on a simulated environment, that such attacks are quite devastating. Concretely, our attack is capable of extracting Δ when the circuit embeds only 8 input non-linear gates with fifth/first-order attack Success-Rates of 0.65/0.7. With as little as 3 such gates, our attack reduces the first-order Guessing Entropy of Δ from 128 to ∼ 48-bits. We further demonstrate our attack via an implementation and power measurements data over an STM 32-bit processor software implementing circuit garbling, and discuss their limitations and mitigation tactics on logical, protocol and implementation layers.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"3 1","pages":"54-79"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81957432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Private Circuits with Precomputation 具有预计算的高效专用电路
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.286-309
Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu
At CHES 2022, Wang et al. described a new paradigm for masked implementations using private circuits, where most intermediates can be precomputed before the input shares are accessed, significantly accelerating the online execution of masked functions. However, the masking scheme they proposed mainly featured (and was designed for) the cost amortization, leaving its (limited) suitability in the above precomputation-based paradigm just as a bonus. This paper aims to provide an efficient, reliable, easy-to-use, and precomputation-compatible masking scheme. We propose a new masked multiplication over the finite field Fq suitable for the precomputation, and prove its security in the composable notion called Probing-Isolating Non-Inference (PINI). Particularly, the operations (e.g., AND and XOR) in the binary field can be achieved by assigning q = 2, allowing the bitsliced implementation that has been shown to be quite efficient for the software implementations. The new masking scheme is applied to leverage the masking of AES and SKINNY block ciphers on ARM Cortex M architecture. The performance results show that the new scheme contributes to a significant speed-up compared with the state-of-the-art implementations. For SKINNY with block size 64, the speed and RAM requirement can be significantly improved (saving around 45% cycles in the online-computation and 60% RAM space for precomputed values) from AES-128, thanks to its smaller number of AND gates. Besides the security proof by hand, we provide formal verifications for the multiplication and T-test evaluations for the masked implementations of AES and SKINNY. Because of the structure of the new masked multiplication, our formal verification can be performed for security orders up to 16.
在CHES 2022上,Wang等人描述了一种使用专用电路实现掩码的新范例,其中大多数中间体可以在访问输入共享之前预先计算,从而显着加快了掩码函数的在线执行。然而,他们提出的掩蔽方案主要以成本摊销为特征(并且是为之设计的),这使得其(有限的)适用性在上述基于预计算的范式中只是一个额外的好处。本文旨在提供一种高效、可靠、易于使用且与预计算兼容的掩码方案。我们提出了一种新的适用于预计算的有限域上的掩模乘法,并在可组合的概念中证明了它的安全性,称为探测隔离非推理(PINI)。特别是,二进制字段中的操作(例如,AND和异或)可以通过赋值q = 2来实现,从而允许对软件实现非常有效的位切片实现。在ARM Cortex M架构下,利用AES和SKINNY分组密码的掩码,提出了新的掩码方案。性能结果表明,与现有的实现方案相比,新方案具有显著的提速效果。对于块大小为64的SKINNY,由于其较少的and门数量,与AES-128相比,速度和RAM需求可以显著提高(在线计算节省约45%的周期,预先计算值节省60%的RAM空间)。除了手工安全性证明外,我们还为AES和SKINNY的掩码实现提供乘法和t检验评估的形式化验证。由于新的掩码乘法的结构,我们的形式验证可以对最多16个安全订单执行。
{"title":"Efficient Private Circuits with Precomputation","authors":"Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu","doi":"10.46586/tches.v2023.i2.286-309","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.286-309","url":null,"abstract":"At CHES 2022, Wang et al. described a new paradigm for masked implementations using private circuits, where most intermediates can be precomputed before the input shares are accessed, significantly accelerating the online execution of masked functions. However, the masking scheme they proposed mainly featured (and was designed for) the cost amortization, leaving its (limited) suitability in the above precomputation-based paradigm just as a bonus. This paper aims to provide an efficient, reliable, easy-to-use, and precomputation-compatible masking scheme. We propose a new masked multiplication over the finite field Fq suitable for the precomputation, and prove its security in the composable notion called Probing-Isolating Non-Inference (PINI). Particularly, the operations (e.g., AND and XOR) in the binary field can be achieved by assigning q = 2, allowing the bitsliced implementation that has been shown to be quite efficient for the software implementations. The new masking scheme is applied to leverage the masking of AES and SKINNY block ciphers on ARM Cortex M architecture. The performance results show that the new scheme contributes to a significant speed-up compared with the state-of-the-art implementations. For SKINNY with block size 64, the speed and RAM requirement can be significantly improved (saving around 45% cycles in the online-computation and 60% RAM space for precomputed values) from AES-128, thanks to its smaller number of AND gates. Besides the security proof by hand, we provide formal verifications for the multiplication and T-test evaluations for the masked implementations of AES and SKINNY. Because of the structure of the new masked multiplication, our formal verification can be performed for security orders up to 16.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"130 1","pages":"286-309"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75828991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond 突破基于lwe的KEM的通用侧信道攻击的极限——对Kyber KEM及其他KEM的并行PC Oracle攻击
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.418-446
Gokulnath Rajendran, P. Ravi, Jan-Pieter D'Anvers, S. Bhasin, A. Chattopadhyay
In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given target, as the attacker requires very minimal information about the target device. However, these attacks have an inherent disadvantage of requiring a few thousand traces to perform full key recovery. This is due to the fact that these attacks typically work by recovering a single bit of information about the secret key per query/trace. In this respect, we propose novel parallel PC oracle based side-channel attacks, which are capable of recovering a generic P number of bits of information about the secret key in a single query/trace. We propose novel techniques to build chosen-ciphertexts so as to efficiently realize a parallel PC oracle for Kyber KEM. We also build a multi-class classifier, which is capable of realizing a practical side-channel based parallel PC oracle with very high success rate. We experimentally validated the proposed attacks (upto P = 10) on the fastest implementation of unprotected Kyber KEM in the pqm4 library. Our experiments yielded improvements in the range of 2.89× and 7.65× in the number of queries, compared to state-of-the-art binary PC oracle attacks, while arbitrarily higher improvements are possible for a motivated attacker, given the generic nature of the proposed attacks. We further conduct a thorough study on applicability to different scenarios, based on the presence/absence of a clone device, and also partial key recovery. Finally, we also show that the proposed attacks are able to achieve the lowest number of queries for key recovery, even for implementations protected with low-cost countermeasures such as shuffling. Our work therefore, concretely demonstrates the power of PC oracle attacks on Kyber KEM, thereby stressing the need for concrete countermeasures such as masking for Kyber and other lattice-based KEMs.
在这项工作中,我们提出了针对基于二进制明文检查(PC) oracle的Kyber KEM侧信道攻击的通用和新颖的适应性。这些攻击在选定的密文设置中操作,并且相当通用且易于安装在给定目标上,因为攻击者需要关于目标设备的非常少的信息。然而,这些攻击有一个固有的缺点,即需要几千条跟踪才能执行完整的密钥恢复。这是因为这些攻击通常通过每个查询/跟踪恢复有关密钥的单个信息来工作。在这方面,我们提出了一种新的基于并行PC oracle的侧信道攻击,它能够在单个查询/跟踪中恢复关于密钥的通用P位信息。为了有效地实现Kyber KEM的并行PC预言机,我们提出了一种新的选择密文构建技术。我们还建立了一个多类分类器,该分类器能够实现一个实用的基于侧信道的并行PC oracle,并且成功率很高。我们在pqm4库中对未受保护的Kyber KEM的最快实现进行了实验验证(最高P = 10)。与最先进的二进制PC oracle攻击相比,我们的实验在查询数量上提高了2.89倍到7.65倍,而考虑到所提议攻击的一般性质,对于有动机的攻击者来说,可能会有更高的改进。我们进一步深入研究了基于存在/不存在克隆设备以及部分密钥恢复的不同场景的适用性。最后,我们还展示了所提出的攻击能够实现最低数量的键恢复查询,甚至对于使用低成本对策(如变换)保护的实现也是如此。因此,我们的工作具体地展示了PC oracle攻击Kyber KEM的能力,从而强调了对Kyber和其他基于格子的KEM进行屏蔽等具体对策的必要性。
{"title":"Pushing the Limits of Generic Side-Channel Attacks on LWE-based KEMs - Parallel PC Oracle Attacks on Kyber KEM and Beyond","authors":"Gokulnath Rajendran, P. Ravi, Jan-Pieter D'Anvers, S. Bhasin, A. Chattopadhyay","doi":"10.46586/tches.v2023.i2.418-446","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.418-446","url":null,"abstract":"In this work, we propose generic and novel adaptations to the binary Plaintext-Checking (PC) oracle based side-channel attacks for Kyber KEM. These attacks operate in a chosen-ciphertext setting, and are fairly generic and easy to mount on a given target, as the attacker requires very minimal information about the target device. However, these attacks have an inherent disadvantage of requiring a few thousand traces to perform full key recovery. This is due to the fact that these attacks typically work by recovering a single bit of information about the secret key per query/trace. In this respect, we propose novel parallel PC oracle based side-channel attacks, which are capable of recovering a generic P number of bits of information about the secret key in a single query/trace. We propose novel techniques to build chosen-ciphertexts so as to efficiently realize a parallel PC oracle for Kyber KEM. We also build a multi-class classifier, which is capable of realizing a practical side-channel based parallel PC oracle with very high success rate. We experimentally validated the proposed attacks (upto P = 10) on the fastest implementation of unprotected Kyber KEM in the pqm4 library. Our experiments yielded improvements in the range of 2.89× and 7.65× in the number of queries, compared to state-of-the-art binary PC oracle attacks, while arbitrarily higher improvements are possible for a motivated attacker, given the generic nature of the proposed attacks. We further conduct a thorough study on applicability to different scenarios, based on the presence/absence of a clone device, and also partial key recovery. Finally, we also show that the proposed attacks are able to achieve the lowest number of queries for key recovery, even for implementations protected with low-cost countermeasures such as shuffling. Our work therefore, concretely demonstrates the power of PC oracle attacks on Kyber KEM, thereby stressing the need for concrete countermeasures such as masking for Kyber and other lattice-based KEMs.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"27 1","pages":"418-446"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75796279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks 硬件中的素场掩蔽及其抗低噪声SCA攻击的有效性
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.482-518
Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, François-Xavier Standaert
A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking. Indeed, it is a common observation that the desired security amplification of Boolean masking collapses when the noise level in the measurements is too low. Arithmetic encodings in prime fields can help to maintain an exponential increase of the attack complexity in the number of shares even in such a challenging context. In this work, we contribute to this emerging topic in two main directions. First, we propose novel masked hardware gadgets for secure squaring in prime fields (since squaring is non-linear in non-binary fields) which prove to be significantly more resource-friendly than corresponding masked multiplications. We then formally show their local and compositional security for arbitrary orders. Second, we attempt to >experimentally evaluate the performance vs. security tradeoff of prime-field masking. In order to enable a first comparative case study in this regard, we exemplarily consider masked implementations of the AES as well as the recently proposed AESprime. AES-prime is a block cipher partially resembling the standard AES, but based on arithmetic operations modulo a small Mersenne prime. We present cost and performance figures for masked AES and AES-prime implementations, and experimentally evaluate their susceptibility to low-noise side-channel attacks. We consider both the dynamic and the static power consumption for our low-noise analyses and emulate strong adversaries. Static power attacks are indeed known as a threat for side-channel countermeasures that require a certain noise level to be effective because of the adversary’s ability to reduce the noise through intra-trace averaging. Our results show consistently that for the noise levels in our practical experiments, the masked prime-field implementations provide much higher security for the same number of shares. This compensates for the overheads prime computations lead to and remains true even if / despite leaking each share with a similar Signal-to-Noise Ratio (SNR) as their binary equivalents. We hope our results open the way towards new cipher designs tailored to best exploit the advantages of prime-field masking.
最近的一项研究表明,与布尔掩码相比,在素数域中的算术掩码可以对被动物理对手提供更强的安全保证。实际上,一个常见的观察结果是,当测量中的噪声水平过低时,期望的布尔掩蔽的安全放大就会崩溃。即使在这样一个具有挑战性的环境中,素数域中的算术编码也可以帮助保持攻击复杂度的指数增长。在这项工作中,我们从两个主要方向为这一新兴主题做出贡献。首先,我们提出了一种新的掩码硬件装置,用于素数域的安全平方(因为非二进制域的平方是非线性的),它被证明比相应的掩码乘法更节省资源。然后,我们正式地展示了任意订单的局部和组合安全性。其次,我们试图通过实验来评估素域屏蔽的性能与安全权衡。为了在这方面进行第一个比较案例研究,我们举例考虑AES的掩码实现以及最近提出的AESprime。AES-素数是一种分组密码,部分类似于标准AES,但基于对小梅森素数模的算术运算。我们给出了掩码AES和AES素数实现的成本和性能数据,并通过实验评估了它们对低噪声侧信道攻击的敏感性。我们考虑了动态和静态功耗为我们的低噪声分析和模拟强大的对手。静态功率攻击确实被认为是对侧信道对抗的威胁,因为对手有能力通过迹内平均来降低噪声,所以需要一定的噪声水平才能有效。我们的结果一致地表明,对于我们实际实验中的噪声水平,屏蔽素域实现为相同数量的共享提供了更高的安全性。这弥补了素数计算导致的开销,并且即使/尽管泄漏每个共享具有与二进制等价物相似的信噪比(SNR),仍然是正确的。我们希望我们的研究结果为新的密码设计开辟道路,以最好地利用素域掩蔽的优势。
{"title":"Prime-Field Masking in Hardware and its Soundness against Low-Noise SCA Attacks","authors":"Gaëtan Cassiers, Loïc Masure, Charles Momin, Thorben Moos, François-Xavier Standaert","doi":"10.46586/tches.v2023.i2.482-518","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.482-518","url":null,"abstract":"A recent study suggests that arithmetic masking in prime fields leads to stronger security guarantees against passive physical adversaries than Boolean masking. Indeed, it is a common observation that the desired security amplification of Boolean masking collapses when the noise level in the measurements is too low. Arithmetic encodings in prime fields can help to maintain an exponential increase of the attack complexity in the number of shares even in such a challenging context. In this work, we contribute to this emerging topic in two main directions. First, we propose novel masked hardware gadgets for secure squaring in prime fields (since squaring is non-linear in non-binary fields) which prove to be significantly more resource-friendly than corresponding masked multiplications. We then formally show their local and compositional security for arbitrary orders. Second, we attempt to >experimentally evaluate the performance vs. security tradeoff of prime-field masking. In order to enable a first comparative case study in this regard, we exemplarily consider masked implementations of the AES as well as the recently proposed AESprime. AES-prime is a block cipher partially resembling the standard AES, but based on arithmetic operations modulo a small Mersenne prime. We present cost and performance figures for masked AES and AES-prime implementations, and experimentally evaluate their susceptibility to low-noise side-channel attacks. We consider both the dynamic and the static power consumption for our low-noise analyses and emulate strong adversaries. Static power attacks are indeed known as a threat for side-channel countermeasures that require a certain noise level to be effective because of the adversary’s ability to reduce the noise through intra-trace averaging. Our results show consistently that for the noise levels in our practical experiments, the masked prime-field implementations provide much higher security for the same number of shares. This compensates for the overheads prime computations lead to and remains true even if / despite leaking each share with a similar Signal-to-Noise Ratio (SNR) as their binary equivalents. We hope our results open the way towards new cipher designs tailored to best exploit the advantages of prime-field masking.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"74 1","pages":"482-518"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80801811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation? 如何安全是指数盲RSA-CRT与滑动窗口求幂?
Pub Date : 2023-03-06 DOI: 10.46586/tches.v2023.i2.241-269
Rei Ueno, N. Homma
This paper presents the first security evaluation of exponent-blinded RSA–CRT implementation with sliding window exponentiation against cache attacks. Our main contributions are threefold. (1) We demonstrate an improved cache attack using Flush+Reload on RSA–CRT to estimate the squaring–multiplication operational sequence. The proposed method can estimate a correct squaring–multiplication sequence from one Flush+Reload trace, while the existing Flush+Reload attacks always contain errors in the sequence estimation. This is mandatory for the subsequent steps in the proposed attack. (2) We present a new and first partial key exposure attack on exponent-blinded RSA–CRT with a random-bit leak. The proposed attack first estimates a random mask for blinding exponent using a modification of the Schindler–Wiemers continued fraction attack, and then recovers the secret key using an extension of the Heninger–Shacham branch-and-prune attack. We experimentally show that the proposed attack on RSA–CRT using a practical window size of 5 with 16-, 32-, and 64-bit masks is carried out with complexity of 225.6, 267.7, and 2161, respectively. (3) We then investigate the tradeoffs between mask bit length and implementation performance. The computational cost of exponent-blinded RSA–CRT using a sliding window with a 32- and 64-bit mask are 15% and 10% faster than that with a 128-bit mask, respectively, as we confirmed that 32- and 64-bit masks are sufficient to defeat the proposed attack. Our source code used in the experiment is publicly available.
本文首次对基于滑动窗口求幂的指数盲RSA-CRT实现进行了针对缓存攻击的安全性评估。我们的主要贡献有三个方面。(1)我们演示了一种改进的缓存攻击,使用RSA-CRT上的Flush+Reload来估计平方乘法运算序列。该方法可以从一个Flush+Reload跟踪中估计出正确的平方乘序列,而现有的Flush+Reload攻击在序列估计中往往存在错误。这对于提议攻击的后续步骤是强制性的。(2)提出了一种新的、首次针对指数盲RSA-CRT随机位泄漏的部分密钥暴露攻击方法。该算法首先利用改进的Schindler-Wiemers连分式攻击估计盲指数的随机掩码,然后利用扩展的Heninger-Shacham分支-剪枝攻击恢复密钥。我们通过实验表明,使用实际窗口大小为5的16位、32位和64位掩码对RSA-CRT进行攻击的复杂度分别为225.6、267.7和2161。(3)然后我们研究了掩码位长度和实现性能之间的权衡。使用具有32位和64位掩码的滑动窗口的指数盲RSA-CRT的计算成本分别比使用128位掩码的计算成本快15%和10%,因为我们证实32位和64位掩码足以击败所提出的攻击。我们在实验中使用的源代码是公开的。
{"title":"How Secure is Exponent-blinded RSA-CRT with Sliding Window Exponentiation?","authors":"Rei Ueno, N. Homma","doi":"10.46586/tches.v2023.i2.241-269","DOIUrl":"https://doi.org/10.46586/tches.v2023.i2.241-269","url":null,"abstract":"This paper presents the first security evaluation of exponent-blinded RSA–CRT implementation with sliding window exponentiation against cache attacks. Our main contributions are threefold. (1) We demonstrate an improved cache attack using Flush+Reload on RSA–CRT to estimate the squaring–multiplication operational sequence. The proposed method can estimate a correct squaring–multiplication sequence from one Flush+Reload trace, while the existing Flush+Reload attacks always contain errors in the sequence estimation. This is mandatory for the subsequent steps in the proposed attack. (2) We present a new and first partial key exposure attack on exponent-blinded RSA–CRT with a random-bit leak. The proposed attack first estimates a random mask for blinding exponent using a modification of the Schindler–Wiemers continued fraction attack, and then recovers the secret key using an extension of the Heninger–Shacham branch-and-prune attack. We experimentally show that the proposed attack on RSA–CRT using a practical window size of 5 with 16-, 32-, and 64-bit masks is carried out with complexity of 225.6, 267.7, and 2161, respectively. (3) We then investigate the tradeoffs between mask bit length and implementation performance. The computational cost of exponent-blinded RSA–CRT using a sliding window with a 32- and 64-bit mask are 15% and 10% faster than that with a 128-bit mask, respectively, as we confirmed that 32- and 64-bit masks are sufficient to defeat the proposed attack. Our source code used in the experiment is publicly available.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"111 1","pages":"241-269"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79331732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference 基于信息熵和群体隐私偏好的数据共享隐私度量模型
Pub Date : 2023-03-03 DOI: 10.3390/cryptography7010011
Yihong Guo, Jinxin Zuo, Ziyu Guo, Jiahao Qi, Yueming Lu
With the development of the mobile internet, service providers obtain data and resources through a large number of terminal user devices. They use private data for business empowerment, which improves the user experience while causing users’ privacy disclosure. Current research ignores the impact of disclosing user non-sensitive attributes under a single scenario of data sharing and lacks consideration of users’ privacy preferences. This paper constructs a data-sharing privacy metrics model based on information entropy and group privacy preferences. Use information theory to model the correlation of the privacy metrics problem, the improved entropy weight algorithm to measure the overall privacy of the data, and the analytic hierarchy process to correct user privacy preferences. Experiments show that this privacy metrics model can better quantify data privacy than conventional methods, provide a reliable evaluation mechanism for privacy security in data sharing and publishing scenarios, and help to enhance data privacy protection.
随着移动互联网的发展,运营商通过大量的终端用户设备获取数据和资源。他们使用私有数据进行业务授权,这在改善用户体验的同时也导致了用户隐私的泄露。目前的研究忽略了在单一数据共享场景下披露用户非敏感属性的影响,缺乏对用户隐私偏好的考虑。本文构建了基于信息熵和群体隐私偏好的数据共享隐私度量模型。利用信息论对隐私度量问题的相关性进行建模,利用改进的熵权算法对数据的整体隐私性进行度量,利用层次分析法对用户隐私偏好进行修正。实验表明,该隐私度量模型比传统方法能更好地量化数据隐私,为数据共享和发布场景下的隐私安全提供可靠的评估机制,有助于增强数据隐私保护。
{"title":"Data Sharing Privacy Metrics Model Based on Information Entropy and Group Privacy Preference","authors":"Yihong Guo, Jinxin Zuo, Ziyu Guo, Jiahao Qi, Yueming Lu","doi":"10.3390/cryptography7010011","DOIUrl":"https://doi.org/10.3390/cryptography7010011","url":null,"abstract":"With the development of the mobile internet, service providers obtain data and resources through a large number of terminal user devices. They use private data for business empowerment, which improves the user experience while causing users’ privacy disclosure. Current research ignores the impact of disclosing user non-sensitive attributes under a single scenario of data sharing and lacks consideration of users’ privacy preferences. This paper constructs a data-sharing privacy metrics model based on information entropy and group privacy preferences. Use information theory to model the correlation of the privacy metrics problem, the improved entropy weight algorithm to measure the overall privacy of the data, and the analytic hierarchy process to correct user privacy preferences. Experiments show that this privacy metrics model can better quantify data privacy than conventional methods, provide a reliable evaluation mechanism for privacy security in data sharing and publishing scenarios, and help to enhance data privacy protection.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"98 1","pages":"11"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76541456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC 求解MPKC相关MQ问题的f4型算法选择策略
Pub Date : 2023-02-27 DOI: 10.3390/cryptography7010010
Takashi Kurokawa, Takuma Ito, N. Shinohara, A. Yamamura, S. Uchiyama
Multivariate public-key cryptosystems are potential candidates for post-quantum cryptography. The security of multivariate public-key cryptosystems relies on the hardness of solving a system of multivariate quadratic polynomial equations. Faugère’s F4 algorithm is one of the solution techniques based on the theory of Gröbner bases and selects critical pairs to compose the Macaulay matrix. Reducing the matrix size is essential. Previous research has not fully examined how many critical pairs it takes to reduce to zero when echelonizing the Macaulay matrix in rows. Ito et al. (2021) proposed a new critical-pair selection strategy for solving multivariate quadratic problems associated with encryption schemes. Instead, this paper extends their selection strategy for solving the problems associated with digital signature schemes. Using the OpenF4 library, we compare the software performance between the integrated F4-style algorithm of the proposed methods and the original F4-style algorithm. Our experimental results demonstrate that the proposed methods can reduce the processing time of the F4-style algorithm by up to a factor of about seven under certain specific parameters. Moreover, we compute the minimum number of critical pairs to reduce to zero and propose their extrapolation outside our experimental scope for further research.
多元公钥密码系统是后量子密码学的潜在候选者。多变量公钥密码系统的安全性取决于求解多变量二次多项式方程组的难易程度。faug的F4算法是基于Gröbner基理论,选取关键对组成Macaulay矩阵的求解技术之一。减小矩阵尺寸是必要的。以前的研究并没有充分研究当麦考利矩阵成行阶梯化时,需要多少关键对才能归零。Ito等人(2021)提出了一种新的关键对选择策略,用于解决与加密方案相关的多元二次问题。相反,本文扩展了他们的选择策略来解决与数字签名方案相关的问题。利用OpenF4库,我们比较了所提出方法的集成f4风格算法与原始f4风格算法的软件性能。实验结果表明,在特定参数下,所提出的方法可以将f4式算法的处理时间缩短约7倍。此外,我们还计算了要减少到零的最小临界对数,并在实验范围之外提出了它们的外推,以供进一步研究。
{"title":"Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC","authors":"Takashi Kurokawa, Takuma Ito, N. Shinohara, A. Yamamura, S. Uchiyama","doi":"10.3390/cryptography7010010","DOIUrl":"https://doi.org/10.3390/cryptography7010010","url":null,"abstract":"Multivariate public-key cryptosystems are potential candidates for post-quantum cryptography. The security of multivariate public-key cryptosystems relies on the hardness of solving a system of multivariate quadratic polynomial equations. Faugère’s F4 algorithm is one of the solution techniques based on the theory of Gröbner bases and selects critical pairs to compose the Macaulay matrix. Reducing the matrix size is essential. Previous research has not fully examined how many critical pairs it takes to reduce to zero when echelonizing the Macaulay matrix in rows. Ito et al. (2021) proposed a new critical-pair selection strategy for solving multivariate quadratic problems associated with encryption schemes. Instead, this paper extends their selection strategy for solving the problems associated with digital signature schemes. Using the OpenF4 library, we compare the software performance between the integrated F4-style algorithm of the proposed methods and the original F4-style algorithm. Our experimental results demonstrate that the proposed methods can reduce the processing time of the F4-style algorithm by up to a factor of about seven under certain specific parameters. Moreover, we compute the minimum number of critical pairs to reduce to zero and propose their extrapolation outside our experimental scope for further research.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"33 1","pages":"10"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76101428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking Windows Hello for Business: Is It What We Were Promised? 攻击Windows Hello业务:这是我们所承诺的吗?
Pub Date : 2023-02-14 DOI: 10.3390/cryptography7010009
Joseph Haddad, N. Pitropakis, C. Chrysoulas, M. Lemoudden, W. Buchanan
Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to explore the problems that password authentication and password policies present and aims to deploy Windows Hello for Business (WHFB) on-premises. This includes creating three virtual machines (VMs) and evaluating WHFB as a password-less solution and showing how an attacker with privileged access may retrieve the end user’s domain password from the computer’s memory using Mimikatz and describing the possible results. The conducted research tests are in the form of two attack methods. This was feasible by the creation of three VMs operating in the following way. The first VM will act as a domain controller (DC) and certificate authority server (CA server). The second VM will act as an Active Directory Federation Service (ADFS). The third VM will act as the end-user device. The test findings research summarized that password-less authentication is far more secure than the traditional authentication method; this is evidenced throughout the author’s tests. Within the first test, it was possible to retrieve the password from an enrolled device for WHFB while it was still in the second phase of the deployment. The second test was a brute-force attack on the PIN of WHFB; since WHFB has measures to prevent such attacks, the attack was unsuccessful. However, even though the retrieval of the password was successful, there are several obstacles to achieving this outcome. It was concluded that many organizations still use password authentication as their primary authentication method for accessing devices and applications. Larger organizations such as Microsoft and Google support the adoption of password-less authentication for end-users, and the current usage of password-less authentication shared by both organizations is encouraged. This usually leads organizations to adopt this new solution for their IT infrastructure. This is because it has been used and tested by millions of people and has proven to be safe. This supports the findings of increased usage and the need for password-less authentication by today’s users.
传统的密码身份验证方法在过去引发了许多问题,包括不安全的实践,因此身份验证的演变应该以无密码解决方案的形式出现也就不足为奇了。本研究旨在探索密码认证和密码策略存在的问题,并旨在部署Windows Hello for Business (WHFB)。这包括创建三个虚拟机(vm)并评估WHFB作为无密码解决方案,并展示具有特权访问权限的攻击者如何使用Mimikatz从计算机内存中检索最终用户的域密码,并描述可能的结果。所进行的研究测试以两种攻击方法的形式进行。这可以通过创建以以下方式运行的三个vm来实现。第一个VM将充当域控制器(DC)和证书颁发机构服务器(CA服务器)。第二个VM将充当Active Directory联合服务(ADFS)。第三个VM将充当最终用户设备。测试结果研究表明:无密码认证的安全性远远高于传统的认证方式;这一点在提交人的测试中得到了证明。在第一次测试中,可以从已注册的WHFB设备中检索密码,而该设备仍处于部署的第二阶段。第二个测试是对WHFB的PIN进行暴力攻击;由于WHFB有防止这类攻击的措施,所以这次攻击没有成功。然而,即使成功地检索了密码,实现这一结果仍然存在一些障碍。结论是,许多组织仍然使用密码身份验证作为访问设备和应用程序的主要身份验证方法。像Microsoft和Google这样的大型组织支持对最终用户采用无密码身份验证,并且目前鼓励这两个组织共享的无密码身份验证的使用。这通常会导致组织为其IT基础设施采用这种新的解决方案。这是因为它已经被数百万人使用和测试,并被证明是安全的。这支持了使用量增加的结果,以及当今用户对无密码身份验证的需求。
{"title":"Attacking Windows Hello for Business: Is It What We Were Promised?","authors":"Joseph Haddad, N. Pitropakis, C. Chrysoulas, M. Lemoudden, W. Buchanan","doi":"10.3390/cryptography7010009","DOIUrl":"https://doi.org/10.3390/cryptography7010009","url":null,"abstract":"Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to explore the problems that password authentication and password policies present and aims to deploy Windows Hello for Business (WHFB) on-premises. This includes creating three virtual machines (VMs) and evaluating WHFB as a password-less solution and showing how an attacker with privileged access may retrieve the end user’s domain password from the computer’s memory using Mimikatz and describing the possible results. The conducted research tests are in the form of two attack methods. This was feasible by the creation of three VMs operating in the following way. The first VM will act as a domain controller (DC) and certificate authority server (CA server). The second VM will act as an Active Directory Federation Service (ADFS). The third VM will act as the end-user device. The test findings research summarized that password-less authentication is far more secure than the traditional authentication method; this is evidenced throughout the author’s tests. Within the first test, it was possible to retrieve the password from an enrolled device for WHFB while it was still in the second phase of the deployment. The second test was a brute-force attack on the PIN of WHFB; since WHFB has measures to prevent such attacks, the attack was unsuccessful. However, even though the retrieval of the password was successful, there are several obstacles to achieving this outcome. It was concluded that many organizations still use password authentication as their primary authentication method for accessing devices and applications. Larger organizations such as Microsoft and Google support the adoption of password-less authentication for end-users, and the current usage of password-less authentication shared by both organizations is encouraged. This usually leads organizations to adopt this new solution for their IT infrastructure. This is because it has been used and tested by millions of people and has proven to be safe. This supports the findings of increased usage and the need for password-less authentication by today’s users.","PeriodicalId":13186,"journal":{"name":"IACR Trans. Cryptogr. Hardw. Embed. Syst.","volume":"81 1","pages":"9"},"PeriodicalIF":0.0,"publicationDate":"2023-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82465505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
IACR Trans. Cryptogr. Hardw. Embed. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1