CARRY-BASED DIFFERENTIAL POWER ANALYSIS AND ITS APPLICATION TO TESTING FOR VULNERABILITY OF SHA-2 AND HMAC-SHA-2 TO SIDE CHANNEL ATTACK

    公开(公告)号:US20230269065A1

    公开(公告)日:2023-08-24

    申请号:US18173569

    申请日:2023-02-23

    申请人: FortifyIQ, Inc.

    IPC分类号: H04L9/00 G06F21/57

    摘要: In a general aspect, a method for testing vulnerability of a cryptographic function (CF) to a side-channel attack includes providing a plurality of input values to the function, where the CF, for each input value calculates a sum of the input value and a first value of the CF, and replaces a second value of the CF with the sum. The method further includes measuring a set of samples including a respective side-channel leakage sample for each input value. The method also includes iteratively performing a series of operations including splitting the set of samples into a plurality of subsets based on the input values, calculating a respective value for each subset based on samples of the subset, and comparing the respective values for different subsets to discover respective bit values of the first value and the second value from their least significant bits to most significant bits.

    REDUNDANCY AES MASKING BASIS FOR ATTACK MITIGATION USING LOOKUP TABLES

    公开(公告)号:US20240089086A1

    公开(公告)日:2024-03-14

    申请号:US18461206

    申请日:2023-09-05

    申请人: FortifyIQ, Inc.

    IPC分类号: H04L9/06 G06F17/16 H04L9/00

    摘要: Techniques include replacing many of the functions used in finite-field-based arithmetic with lookup tables (LUTs) and combining such LUTs with redundancy-based protection. Advantageously, using LUTs makes it possible to dramatically decrease the redundancy level (e.g., from d=8 to d=3 or 4) and the power consumption and increase the maximal frequency, while preserving the same protection level, latency and performance. The improvement is applicable not only to AES, but also to other algorithms based on a finite field arithmetic, and in particular SM4, ARIA, and Camellia which use Sboxes very similar to or the same as the AES Sbox.

    Side-channel attack on HMAC-SHA-2 and associated testing

    公开(公告)号:US11995191B2

    公开(公告)日:2024-05-28

    申请号:US17444832

    申请日:2021-08-11

    申请人: FortifyIQ, Inc.

    IPC分类号: G06F21/57 H04L9/06

    摘要: A method for testing an HMAC implementation for vulnerability to a side-channel attack can include mounting a template attack. The attack can include generating, based on first side-channel leakage information associated with execution of a hash function of the HMAC implementation, a plurality of template tables. Each template table can correspond, respectively, with a subset of bit positions of an internal state of the hash function. The attack can further include generating, based on second side-channel leakage information, a plurality of hypotheses for an internal state of an invocation of the hash function based on a secret key. The method can further include generating, using the hash function, respective hash values generated from each of the plurality of hypotheses and a message. The method can also include comparing each of the respective hash values with a hash value generated using the secret key to determine vulnerability of the HMAC implementation.

    SIDE-CHANNEL ATTACK ON HMAC-SHA-2 AND ASSOCIATED TESTING

    公开(公告)号:US20220414227A1

    公开(公告)日:2022-12-29

    申请号:US17444832

    申请日:2021-08-11

    申请人: FortifyIQ, Inc.

    IPC分类号: G06F21/57 H04L9/06

    摘要: A method for testing an HMAC implementation for vulnerability to a side-channel attack can include mounting a template attack. The attack can include generating, based on first side-channel leakage information associated with execution of a hash function of the HMAC implementation, a plurality of template tables. Each template table can correspond, respectively, with a subset of bit positions of an internal state of the hash function. The attack can further include generating, based on second side-channel leakage information, a plurality of hypotheses for an internal state of an invocation of the hash function based on a secret key. The method can further include generating, using the hash function, respective hash values generated from each of the plurality of hypotheses and a message. The method can also include comparing each of the respective hash values with a hash value generated using the secret key to determine vulnerability of the HMAC implementation.