Cryptographic harware and embedded systems

631 122 2
Cryptographic harware and embedded systems

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

LNCS 8731 Lejla Batina Matthew Robshaw (Eds.) Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop Busan, South Korea, September 23–26, 2014 Proceedings 123 Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany 8731 Lejla Batina Matthew Robshaw (Eds.) Cryptographic Hardware and Embedded Systems – CHES 2014 16th International Workshop Busan, South Korea, September 23-26, 2014 Proceedings 13 Volume Editors Lejla Batina Radboud University Nijmegen FNWI-iCIS/DS P.O Box 9010, 6500 GL Nijmegen, The Netherlands E-mail: lejla@cs.ru.nl Matthew Robshaw Impinj, Inc 701 N 34th Street, Suite 300, Seattle, WA 98103, USA E-mail: matt.robshaw@impinj.com ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-662-44708-6 e-ISBN 978-3-662-44709-3 DOI 10.1007/978-3-662-44709-3 Springer Heidelberg New York Dordrecht London Library of Congress Control Number: 2014947647 LNCS Sublibrary: SL – Security and Cryptology © International Association for Cryptologic Research 2014 This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in ist current version, and permission for use must always be obtained from Springer Permissions for use may be obtained through RightsLink at the Copyright Clearance Center Violations are liable to prosecution under the respective Copyright Law The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made The publisher makes no warranty, express or implied, with respect to the material contained herein Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Preface The 16th International Workshop on Cryptographic Hardware and Embedded Systems was held in Busan, South Korea, during September 23–26, 2014 The workshop was sponsored by the International Association for Cryptologic Research CHES 2014 received 127 submissions from all parts of the globe Each paper was reviewed by at least four independent reviewers, with papers from Program Committee members receiving five reviews in the first round of reviewing The 43 members of the Program Committee were aided in this complex and timeconsuming task by a further 203 external reviewers, providing striking testament to the size and robust health of the CHES community Out of the 127 submissions, 33 were chosen for presentation at the workshop They represented all areas of research that are considered to sit under the CHES umbrella, and they reflected the particular blend of the theoretical and practical that makes CHES such an appealing (and successful) workshop We would like to thank the Program Committee and external reviewers for their expert views and spirited contributions to the review process It was a tremendously difficult task to choose the program for CHES 2014; the standard of submissions was very high It was even harder to identify a single best paper, but our congratulations go to Naofumi Homma, Yu-ichi Hayashi, Noriyuki Miura, Daisuke Fujimoto, Daichi Tanaka, Makoto Nagata, and Takafumi Aoki from Kobe and Tohoku Universities for the CHES 2014 Best Paper “EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor.” We were delighted that Andr´e Weimerskirch was able to accept our invitation to be the invited speaker at CHES 2014 His presentation “V2V Communication Security: A Privacy-Preserving Design for 300 Million Vehicles” cast a fascinating light on a new and far-reaching area of deployment In addition, expert tutorials by Guido Bertoni and Viktor Fischer and a poster session chaired by Nele Mentens made CHES 2014 the complete workshop Thank you all for your contributions We are, of course, indebted to the general chair, Prof Kwangjo Kim, and the local Organizing Committee who together proved the ideal liaison for establishing the layout of the program and for supporting the speakers Our job as program co-chairs was made much easier by the excellent tools developed by Shai Halevi and we offer our thanks to Thomas Eisenbarth, who maintained the CHES 2014 website; both Shai and Thomas were always available at short notice to answer our queries On behalf of the CHES community we would like to thank the CHES 2014 sponsors The interest of companies in supporting CHES is an excellent indication of the continued relevance and importance of the workshop VI Preface Finally, we would like to thank all the authors who contributed their work to CHES 2014 Without you, the workshop would not exist July 2014 Lejla Batina Matt Robshaw CHES 2014 Workshop on Cryptographic Hardware and Embedded Systems Busan, South Korea September 23–26, 2014 Sponsored by the International Association for Cryptologic Research General Chair Kwangjo Kim KAIST, South Korea Program Chairs Lejla Batina Matt Robshaw Radboud University Nijmegen, The Netherlands Impinj, USA Program Committee Onur Acii¸cmez Dan Bernstein Guido Bertoni Christophe Clavier Jean-Sebastien Coron Thomas Eisenbarth Junfeng Fan Wieland Fischer Pierre-Alain Fouque Kris Gaj Benedikt Gierlichs Louis Goubin Tim Gă uneysu Dong-Guk Han Helena Handschuh Michael Hutter Samsung Research America, USA University of Illinois at Chicago, USA, and Technische Universiteit Eindhoven, The Netherlands STMicroelectronics, Italy University of Limoges, France University of Luxembourg, Luxembourg Worcester Polytechnic Institute, USA Nationz Technologies, China Infineon Technologies, Germany Universit´e Rennes and Institut Universitaire de France, France George Mason University, USA KU Leuven, Belgium University of Versailles, France Ruhr-Universităat Bochum, Germany Kookmin University, South Korea Cryptography Research, USA, and KU Leuven, Belgium Graz University of Technology, Austria VIII CHES 2014 Marc Joye Howon Kim Ilya Kizhvatov Fran¸cois Koeune Farinaz Koushanfar Gregor Leander Kerstin Lemke-Rust Roel Maes Stefan Mangard Marcel Medwed Elke De Mulder Christof Paar Dan Page Eric Peeters Axel Poschmann Emmanuel Prouff Francesco Regazzoni Matthieu Rivain Ahmad-Reza Sadeghi Kazuo Sakiyama Akashi Satoh Patrick Schaumont Peter Schwabe Daisuke Suzuki Mehdi Tibouchi Ingrid Verbauwhede Bo-Yin Yang Technicolor, USA Pusan National University, South Korea Riscure, The Netherlands Universit´e Catholique de Louvain, Belgium ECE, Rice University, USA Ruhr-Universităat Bochum, Germany Bonn-Rhein-Sieg University of Applied Sciences, Germany Intrinsic-ID, The Netherlands Graz University of Technology, Austria NXP Semiconductors, Austria Cryptography Research, USA/France Ruhr-Universităat Bochum, Germany University of Bristol, UK Texas Instruments, USA NXP Semiconductors, Germany ANSSI, France ALaRI, Lugano, Switzerland CryptoExperts, France Technische Universităat Darmstadt/CASED, Germany University of Electro-Communications, Japan University of Electro-Communications, Japan Virginia Tech, USA Radboud University Nijmegen, The Netherlands Mitsubishi Electric, Japan NTT Secure Platform Laboratories, Japan KU Leuven, Belgium Academia Sinica, Taiwan External Reviewers Toru Akishita Frederik Armknecht Gilles Van Assche Aydin Aysu Yoo-Jin Baek Thomas Baign`eres Josep Balasch Guy Barwell Georg Becker Sonia Belaid Alexandre Berzati Shivam Bhasin Begă ul Bilgin Olivier Billet Peter Birkner Christina Boura Nicolas Bruneau Samuel Burri Eleonora Cagli Anne Canteaut Claude Carlet Ricardo Chaves Chien-Ning Chen Cong Chen Ming-Shing Chen Tung Chou Chitchanok Chuengsatiansup Mafalda Cortez Bita Darvish-Rohani Joan Daemen Jeroen Delvaux Odile Derouet Jean-Fran¸cois Dhem Christoph Dobraunig Benedikt Driessen CHES 2014 Fran¸cois Durvaux Barı¸s Ege Maria Eichlseder Benoit Feix Martin Feldhofer Matthieu Finiasz Robert FitzPatrick Jean-Pierre Flori Hamza Fraz Steven Galbraith Bayrak Ali Galip Jean-Fran¸cois Gallais Berndt Gammel Lubos Gaspar Laurie Genelle Benoit Gerard Nahid Farhady Ghalaty Chris Gori Hannes Gross Vincent Grosso Jorge Guajardo Sylvain Guilley Frank Gurkaynak Benoit G´erard Bilal Habib Mike Hamburg Neil Hanley Christian Hanser Nadia Heninger Anthony Van Herrewege Johann Heyszl Markus Hinkelmann Gesine Hinterwă alder Naofumi Homma Ekawat Homsirikamol Seokhie Hong Philippe Hoogvorst Siam Umar Hussain Jong-Hyuk Im Jong-Yeon Park Pascal Junod Stefan Katzenbeisser St´ephanie Kerckhof HeeSeok Kim Hyunmin Kim Tae Hyun Kim Taewon Kim Thomas Korak Po-Chun Kuo Sebastian Kutzner Mario Lamberger Tanja Lange Martin Lauridsen Moon Kyu Lee Vincent van der Leest Andrew Leiserson Tancr`ede Lepoint Liran Lerman Yang Li Zhe Liu Patrick Longa Robert Lorentz Abhranil Maiti Avradip Mandal Stefan Mangard Federica Maria Marino Damien Marion Mark Marson Daniel Martin Silvia Mella Filippo Melzani Florian Mendel Bernd Meyer Azalia Mirhoseini Oliver Mischke Noriyuki Miura Amir Moradi Nadia El Mrabet Michael Muehlberghuber Arslan Munir Yumiko Murakami Ruben Niederhagen Eva Van Niekerk Velickovic Nikola Ivica Nikoli´c Ventzislav Nikov Svetla Nikova Martin Novotny Colin O’Flynn Katsuyuki Okeya David Oswald Jing Pan Roel Peeters Pedro Peris-Lopez John Pham Thomas Plos Joop van de Pol Thomas Păoppelmann Frank Quedenfeld Michael Quisquater Yamini Ravishankar Christian Rechberger Oscar Reparaz Thomas Roche Pankaj Rohatgi Sondre Rønjom Masoud Rostami Sujoy Sinha Roy Vladimir Rozic Minoru Saeki Gokay Saldamli Ahmad Salman Peter Samarin Jacek Samotyja Fabrizio De Santis Pascal Sasdrich Falk Schellenberg Werner Schindler Alexander Schloesser Martin Schlăaer Tobias Schneider Rabia Shahid Aria Shahverdi Malik Umar Sharif Koichi Shimizu Jeong Eun Song Raphael Spreitzer Albert Spruyt Fran¸cois-Xavier Standaert Marc Stoettinger Daehyun Strobel Takeshi Sugawara Berk Sunar Ruggero Susella IX X CHES 2014 Pawel Swierczynski Mostafa Taha Yannick Teglia Russ Tessier Adrain Thillard Mike Tunstall Pim Tuyls Kerem Varici Rajesh Velegalati Alexandre Venelli Fre Vercauteren Dennis Vermoen Vincent Verneuil Ivan Visconti Marcin W´ojcik Megan Wachs Christian Wachsmann Erich Wenger Carolyn Whitnall Alexander Wild Theodore Winograd Christopher Wolf Jasper van Woudenberg Antoine Wurcker Tolga Yalcin Panasayya Yalla Dai Yamamoto Bohan Yang Shang-Yi Yang Gavin Xiaoxu Yao Xin Ye Meng-Day Yu Christian Zenger Ralf Zimmermann Local Organizers Kwangjo Kim Kyung Hyune Rhee Howon Kim Daehyun Ryu Sanguk Shin Dongkuk Han Dooho Choi Byoungcheon Lee KAIST, South Korea Pukyong National University, South Korea Pusan National University, South Korea Hansei University, South Korea Pukyong National University, South Korea Kookmin University, South Korea ETRI, South Korea Joongbu University, South Korea 552 Y Ma et al Positive-edge Counter Ring Oscillator + Slow Clock FIFO Negative-edge Counter Fig Dual-counter measurement circuit In the improved measuring method, two counters are employed to measure the number of positive edges and negative edges in the duration of a single slow clock period, respectively Then, the two counter results are added to form the outputting values After each count finishes, the counters should be cleared to start the next count The clear signal is generated through the clear circuit which is driven by both the ring oscillator signal and the slow clock The counting process of the positive-edge counter with the sampling interval of s is depicted in Figure Between the two adjacent counts, the clear signal lasts accurately one period of the oscillator signal by using the clear circuit If the oscillator frequency is too high to clear the counters within one cycle, the number becomes two or three FRXQWLQJ FOHDU ಹಹ V Fig The counting process (positive edge) Consecutive sampling is adopted in the measurement, and the sampling type is useful to simplify the counting process, because we just need to the counting collection only once for the longer sampling intervals of ms, rather than m times After getting numbers of count results in the duration of s, we can sum the m non-overlapping results to obtain the number of edges in the duration of ms, then we can figure out the quality factor under the interval of ms by calculating the standard variance of these sums Although the clear mechanism makes all sums smaller than the real values by m − 1, it has no impact on calculating the variances of these values 3.2 Jitter Measurement We implement the circuit with 3-inverter RO on Xilinx Virtex-5 FPGA The RO frequency is about 484 MHz, and the slow clock is a MHz crystal oscillator signal, and the circuit output is the number of RO edges within the duration of Entropy Evaluation for Oscillator-Based TRNGs 553 s = 200 ns Having numbers of outputting values in the interval s, we can figure out the number of edges within the sampling interval ms by m-time accumulating For the sampling interval ms, we can calculate the standard deviation σms of the √accumulation results From the renewal theory under i.i.d assumption, √ σm = ms(σ/μ3/2 ) = mσ1 , s → ∞, where σm denotes the standard variance under the interval of ms σm σ m 10 10 Slope=0.5 10 10 Slope=0.5 10 m (a) Simulation results with white noises 10 10 m 10 (b) Practical measuring results in FPGA Fig The measuring results with ideal vs practical noises The simulation and practical results for the measurement method at logarithmic coordinates are shown in Figure 8, whose x-axis is m and y-axis is standard deviation σm In Figure 8(a), with m increasing, the slope of the standard deviation curve is approaching to 0.5, which is consistent with the theory As mentioned, if ms is not large enough, meaning the accumulated jitter is small, the measuring result is larger than the real value Fortunately, we observe that the overhead will be no more than 10% when the measuring standard deviation is larger than 0.8, so these results are available Surprisingly, the practical measuring result is quite different, as shown in Figure 8(b) We find the existence of deterministic (sinusoidal) perturbations which make the σm curve form a wavy pattern of rising In addition, when the sampling interval ms is large (about m > 50), we also observe the existence of correlated noise, under which the standard variance increases faster and the slope becomes larger than 0.5 3.3 Filtering Deterministic Jitter Deterministic perturbations make an overhead for the estimation of random jitter In order to filter deterministic jitter, a measurement method using dual oscillators was presented in [8] The method is based on the fact that the effect of deterministic perturbations is global We use a 15-inverter RO signal as the slow clock to filter the perturbations and measure the random jitter of fast oscillator signal In contrast to the clock measuring result, the RO measuring result does 554 Y Ma et al σm Clock measuring RO measuring 10 Slope=0.5 10 10 m Fig RO measuring result not display an obvious wavy pattern of rising, as shown in Figure Therefore, we obtain the data Ri without the perturbations, which are the experimental data base for verifying the theory 3.4 Discussion for Modeling Assumption In our stochastic model, we assume that the jitter or the noises are i.i.d., but the correlation is observed in the experiment when the sampling interval is long According to [10], correlated noise (such as 1/f noise) is embodied at low frequency in oscillators, while the noise at high frequency is white (or independent) The correlated noise was also observed in [19] which suggested that the sampling frequency should be fast enough to avoid the influence of correlated noise In our proposed TRNG model, the focused sampling interval is m < 12 (see Section 4.2) where the accumulated jitter is insufficient or almost sufficient, so the effect of correlated noise is weak in this region Therefore, for simplicity, we not involve the modeling for correlated noises or jitter in the stochastic model of the TRNG Correlated noise makes the jitter and the counting results have long-term dependence, which also affects sampling bits, so it shall be noted that the effect of correlated noise (especially mixed with white noise) on sampling bits in RObased TRNG is actually an open problem due to the complexity and variety of correlated noise As a preliminary analysis, we not observe the correlation inherited in the sampling bits under correlated noise when accumulated independent jitter is sufficient (see Figure 10) Entropy Evaluation In this section, using the formula of entropy calculation, we deduce the requirement of RO-based TRNGs parameters for sufficient entropy per bit The results are verified by experiments, and the comparison with other work is also presented Entropy Evaluation for Oscillator-Based TRNGs 4.1 555 Parameters for Sufficient Entropy In consecutive sampling, Hn can be derived from Equation (11) The bit-rate entropy is denoted as H = Hn /n According to the experimental result in [12], the threshold value of bit-rate entropy is chosen as 0.9999, i.e., H should be larger than 0.9999 to achieve sufficient security We calculate the bit-rate entropy in term of q for various r from to 0.5 using Matlab numerical calculation (shown in Figure 11) The required q values for different r to achieve sufficient entropy (0.9999) are listed in the second row of Table In contrast to the example of Wi = in Figure 3, the consecutive sampling has the worst balance at r = 0, because the waiting time Wi has a uniform distribution in consecutive sampling In the case of r = 0, when q is larger than 0.9264, the bit-rate entropy is sufficient On the contrary, the generator with r = 0.5 is easiest to acquire sufficient entropy, and the required q is only 0.6511 Given the parameters σ and μ of the fast oscillator signal , we can figure out the required sampling interval for sufficient entropy Table The required q to achieve sufficient entropy for different r PP r r=0.1 r=0.2 r=0.3 r=0.4 PP r=0 r=0.5 ) Req q PPP (0.9) (0.8) (0.7) (0.6) Remark Theory 0.9264 0.9209 0.9029 0.8673 0.7895 0.6511 H > 0.9999 Sim Measured 0.9778 0.9392 0.9198 0.8759 0.7928 0.7002 passing FIPS 140-2 4.2 Experimental Verification In order to verify the parameter requirement, we use the statistical tests FIPS 140-2 [11] to test the sampling bits, including monobit test, poker test, runs test and longest run test We record the required q values for the sampling bits passing all items of FIPS 140-2, and compare them with the theoretical ones Matlab Simulation We first use Matlab simulation to verify the theoretical results, as the environment can be ideal as expected In the simulation, the half-periods of the fast oscillator signal are set to (1.125, 0.0172) i.i.d normal distribution Using the measuring method under a preset sampling interval, we can get the counting results, whose standard variance and LSBs can be treated as q and sampling bits, respectively With the sampling interval increasing, the passing point for each r can be observed, as shown in the third row of Table As we mentioned in Figure 8, the measured q values are a little larger than the real values when m is small Therefore, the simulation results approximately match with the theory in Table 1, especially in the aspect of variation tendency The difference between these two results is because that the criteria of the theoretical entropy and FIPS 140-2 are not completely consistent 556 Y Ma et al 1.6 1.4 m σ /passing rate 1.2 X: 11 Y: 1 X: 11 Y: 0.9389 X: 10 Y: 0.8936 0.8 0.6 0.4 q Pass Rate All Pass 0.2 0 10 15 20 25 m Fig 10 Results of measured q and FIPS 140-2 tests in FPGA Practical Experiment We also implement the measurement circuit in the FPGA platform The measuring and test results are shown in Figure 10, where the passing rate means the ratio of the number of passed test items to the number of all items We observe that the passing point lies in the interval q ∈ [0.8936, 0.9389], which nearly corresponds with the simulation and theory However, it seems infeasible to measure the right r at this point to a further verification, since a tiny measuring error will make the measured r totally different in such a high frequency of the fast oscillator signal In addition, it should also be noticed that correlated noise makes an overestimation for thermal jitter, especially when m is large One can employ the method presented in [9] to measure the thermal noise contribution to the jitter 4.3 Comparison with Previous Work For the entropy evaluation of oscillator-based TRNGs, a tight lower bound was provided in [12], and the bit-rate entropy was calculated in [2] by using a phaseoriented method The main results of [12] and [2] are presented as Equations (12) and (13), respectively s H(Bi |Bi−1 , , B1 ) ≥ H(Bi |Wi−1 ) ≈ H(R(s−u) mod 2)PW (du) (12) Hn ≈ n − 2 32(n − 1) cos2 (πr)e−π q π ln(2) (13) In Equation (12), R(s−u) represents the number of crossing edges in the duration of (s − u), and the variables in Equation (13) have been converted for the correspondence of definitions.1 Our estimated bit-rate entropy is larger than the lower bound of [12] as expected, and is almost identical to the result of [2] at the worse cases (r = 0, 0.1, 0.2), as shown in Figure 11 The quality factor Q defined in [2] equals to q /4 Entropy Evaluation for Oscillator-Based TRNGs 0.995 557 r=0.5 r=0.4 0.99 r=0.3 0.8 q: from 0.1 to 1.0 0.98 0.6 0.975 0.97 Prob Entropy 0.985 r=0.2 q: from 0.1 to 1.0 0.4 0.965 0.96 Killmann et al Baudet et al Ours r=0.1 0.955 0.95 0.2 r=0 0.45 0.5 0.55 0.6 0.65 0.7 q 0.75 0.8 0.85 0.9 Fig 11 Comparison result for entropy estimation 0.95 0 0.2 0.4 0.6 0.8 x Fig 12 Prob(Wi ≤ x|bi ) for different q at r=0 However, there are some inconsistencies in the comparison of our result with [2] when r ≥ 0.3, especially at r = 0.5 According to Equation (13), Hn approximately equals to n when r = 0.5, meaning that the bit-rate entropy H achieves the maximum value That is to say, so long as the sampling interval s satisfies that (s mod μ)/μ = r = 0.5 in consecutive sampling, the bit-rate entropy is close to regardless of q Nonetheless, the conclusion is not confirmed in both our theory and simulation experiment In our opinion, r = 0.5 can only guarantee the balance of sampling bits2 , rather than the independence Therefore, when r = 0.5 the generated sequences can pass the statistical tests once the independence of sampling bits is satisfied That is why the generators with r = 0.5 are easier to acquire sufficient entropy Obviously, when q is small, the correlation of sampling bits cannot be eliminated, thus the n-bit entropy cannot approximately equal to n The sampling correlation is further illustrated via the following independence condition 4.4 Independence Condition The sampling correlation is derived from the transfer of the waiting time Wi which affects the (i + 1)th sampling result Therefore, the independence of sampling bits should satisfy ∀bi ∈ {0, 1}, Prob(Wi ≤ x|bi ) = Prob(Wi ≤ x) = x μ For various q values at r = 0, the conditional probability distributions Prob(Wi ≤ x|bi ) are shown in Figure 12, where the curves from outside to inside correspond to the q values from 0.1 to at 0.1 interval Note that r does not make the conditional distribution become uniform easier, but only affects the cross position of these probability curves Therefore, we only present the result of r = When The balance holds only when Wi is uniformly distributed, which just requires a very small q (about 0.1) 558 Y Ma et al q is less than 0.5, the probability distribution is non-uniform, meaning that the correlation still exists Until q is approximately larger than 0.6, the distribution becomes uniform and the correlation is almost eliminated, which is consistent with the calculation results in Table In addition, the experimental result in the next section also confirms the independence condition The Effect of Deterministic Perturbations In this section, we show that the deterministic perturbations make the sampling bits appear to be more “random” and easier to pass statistical tests More importantly, we point out that the seemingly random sequence actually has a vulnerability which makes it possible to predict the sequence 5.1 The Effect on the Statistical Test In order to analyze the effect on the statistical test, we carry out the measurement and FIPS 140-2 statistical tests with deterministic jitter Under deterministic perturbations, the TRNG is easier to pass the test, as shown in Figure 13, where the passing position is m = and the other is m = 11 It is interesting that the passing rate of RO sampling has an abrupt rise at m = 7, which is precisely the position of the crest of the perturbations, meaning that the sampling sequence suddenly becomes more “random” The reason is that the deterministic jitter is not completely filtered out by the dualoscillator method, since the perturbation effects on the two oscillators cannot be exactly identical, though they have been placed as close as possible Moreover, the observation validates the fact that injecting deterministic jitter does improve the randomness of outputting sequences However, note that the deterministic perturbation in our experiment is slight and balanced Once the perturbation becomes strong, it will reduce the amount of inherent independent jitter; once it becomes biased, it will degrade the quality of sampling bits 2.5 σ /passing rate std without deter test without deter All Pass std with deter test with deter 0.5 m σm/passing rate 1.5 1.5 std with d=0 std with d=0.1μ test with d=0.1μ test with d=0 X: Y: 0.682 0.5 std with d=0.3μ test with d=0.3μ All Pass 0 10 15 20 m Fig 13 Measuring results with and without deterministic perturbations 25 0 10 15 20 25 m Fig 14 Simulation results with varying deterministic jitter Entropy Evaluation for Oscillator-Based TRNGs 5.2 559 The Bound for the Randomness Improvement Increasing the amplitude makes it easier to pass the statistical tests However, when we keep increasing the amplitude more than 0.3μ, the passing position does not move up any more, as shown in Figure 14 The final position stops at m = 6, and the current standard deviation caused by random jitter is 0.682, which is consistent with the independence condition Therefore, we can infer that the engagement of deterministic perturbations causes little impact on the correlation of sampling bits but improves the balance of sampling sequences With the deterministic jitter increasing, the sequences can pass the statistical test when the dependence condition holds However, though the balance is achieved for sampling sequences, for each sampling bit the balance is insufficient, because the jitter accumulation for each sampling has not been enough This causes some security problems, such as predicting the sampling bits 5.3 Predicting the “Random” Bits The deterministic perturbation is assumed as sinusoidal signal D(t) = A sin( 2πt TD + T φ0 ) The half-period after perturbing becomes Xi = Tii+1 (1 + D(t))dt we have the following reasonable physical assumptions for deterministic perturbations [2]: TD >> μ (slow variations of D(t)) and Xi ≈ Xi (small deterministic jitter) Therefore, it is easy to deduce that the uniform distribution in [0, μ] still approximately holds for the new waiting time Furthermore, compared with the sampling interval s in the model without perturbations, the mean of the new ith interval is si D(t)dt As equivalent to s − di to apply the model in Section 2, where di = si−1 we mentioned, it is useful to improve the balance of the whole sequence, however, the impact is very limited on a given sampling bit, which allows us to predict the seemingly random bits The probability of the ith bit equaling to bi can be derived from the total probability formula Prob(bi ) = Prob(bi |wi )PW (du), where Prob(bi |wi ) can be calculated from Equation (8) using the modified sampling interval s − di 0.6 predicting practical Prob 0.55 0.5 0.45 0.4 10 15 20 25 30 35 40 45 50 n Fig 15 The comparison of predicting and practical probabilities 560 Y Ma et al Therefore, if precisely knowing the mean μ, standard variance σ, and the behaviors of deterministic jitter, one can precisely compute the probabilities of sample bits in advance We perform a prediction simulation, and compare the predicting probabilities with the practical ones in Figure 15 The practical probabilities come from the statistics of 1000 simulation samples that can pass FIPS 140-2 It is shown that the two sets of probabilities are consistent with each other in most sampling bits Using the predicting results, one can optimize brute-force attacks to significantly reduce the breaking complexity In practical terms, the more precise parameters of TRNGs one knows, the more effective attacks one can perform Though the TRNG output can pass the statistical tests under the perturbations, with environmental factors (such as supply voltage) changing, the frequency and amplitude of the perturbation might change to the values that no longer help to improve the “randomness” (e.g the frequency changes to the multiples of the sampling frequency) Therefore, one way to guarantee the security of under-perturbation TRNGs is to keep the entropy sufficiency in each sampling bit, i.e the q should be large enough As di

Ngày đăng: 22/01/2018, 16:55

Từ khóa liên quan

Mục lục

  • Preface

  • CHES 2014

  • Table of Contents

    • Side-Channel Attacks

      • EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor

        • 1 Introduction

        • 2 EM Attack Sensor

        • 3 Design Methodology

        • 4 Validity Verification

        • 5 Discussion

        • 6 Conclusion

        • References

        • A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks

          • 1 Introduction

          • 2 Probabilistic Methodology

            • 2.1 The Conflation Operator

            • 2.2 Conflating Probabilities of Single-Input Computation

            • 2.3 Conflating Probabilities of Dual-Input Computations

            • 3 Building Blocks

              • 3.1 Single-Input Computation Constraint

              • 3.2 Dual-Input Computation Constraint

              • 3.3 Pruning Records from a Registry

              • 3.4 Data-Redundancy Constraint

              • 3.5 Constructing a Solver for a Cipher

              • 4 Designing a Constraint Solver for AES

                • 4.1 Initialization and Single Input Computations

                • 4.2 Basic Computation of MixColumns

Tài liệu cùng người dùng

Tài liệu liên quan