search query: @supervisor Asokan, N. / total: 11
reference: 3 / 11
« previous | next »
Author:Pereida Garcia, Cesar
Title:Cache-Timing Techniques: Exploiting the DSA Algorithm
Publication type:Master's thesis
Publication year:2016
Pages:(8) + 70      Language:   eng
Department/School:Perustieteiden korkeakoulu
Main subject:   (SCI3071)
Supervisor:Asokan, N. ; Unruh, Dominique
Instructor:Brumley, Billy
Electronic version URL: http://urn.fi/URN:NBN:fi:aalto-201608263035
Location:P1 Ark Aalto  5407   | Archive
Keywords:applied cryptography
cache-timing attacks
side-channel analysis
digital signatures
DSA
OpenSSL
Abstract (eng):Side-channel information is any type of information leaked through unexpected channels due to physical features of a system dealing with data.
The memory cache can be used as a side-channel, leakage and exploitation of side-channel information from the executing processes is possible, leading to the recovery of secret information.
Cache-based side-channel attacks represent a serious threat to implementations of several cryptographic primitives, especially in shared libraries.

This work explains some of the cache-timing techniques commonly used to exploit vulnerable software.
Using a particular combination of techniques and exploiting a vulnerability found in the implementation of the DSA signature scheme in the OpenSSL shared library, a cache-timing attack is performed against the DSA's sliding window exponentiation algorithm.

Moreover, the attack is expanded to show that it is possible to perform cache-timing attacks against protocols relying on the DSA signature scheme.
SSH and TLS are attacked, leading to a key-recovery attack: 260 SSH-2 handshakes to extract a 1024/160-bit DSA hostkey from an OpenSSH server, and 580 TLS 1.2 handshakes to extract a 2048/256-bit DSA key from an stunnel server.
ED:2016-09-04
INSSI record number: 54247
+ add basket
« previous | next »
INSSI