As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com. |
Difference between revisions of "Template Attacks"
(→Creating the Template: There aren't 16 bits in a byte, Greg.) |
(Change header levels) |
||
(2 intermediate revisions by 2 users not shown) | |||
Line 9: | Line 9: | ||
# Apply the template to the attack traces. For each subkey, track which value is most likely to be the correct subkey. Continue until the key has been recovered. | # Apply the template to the attack traces. For each subkey, track which value is most likely to be the correct subkey. Continue until the key has been recovered. | ||
− | = Signals, Noise, and Statistics = | + | == Signals, Noise, and Statistics == |
Before looking at the details of the template attack, it is important to understand the statistics concepts that are involved. A template is effectively a multivariate distribution that describes several key samples in the power traces. This section will describe what a multivariate distribution is and how it can be used in this context. | Before looking at the details of the template attack, it is important to understand the statistics concepts that are involved. A template is effectively a multivariate distribution that describes several key samples in the power traces. This section will describe what a multivariate distribution is and how it can be used in this context. | ||
− | == Noise Distributions == | + | === Noise Distributions === |
Electrical signals are inherently noisy. Any time we take a voltage measurement, we don't expect to see a perfect, constant level. For example, if we attached a multimeter to a 5 V source and took 4 measurements, we might expect to see a data set like (4.95, 5.01, 5.06, 4.98). One way of modelling this voltage source is | Electrical signals are inherently noisy. Any time we take a voltage measurement, we don't expect to see a perfect, constant level. For example, if we attached a multimeter to a 5 V source and took 4 measurements, we might expect to see a data set like (4.95, 5.01, 5.06, 4.98). One way of modelling this voltage source is | ||
Line 43: | Line 43: | ||
so we're very unlikely to see a reading of 7 V. We'll use this to our advantage in this attack: if <math>f(x)</math> is very small for one of our subkey guesses, it's probably a wrong guess. | so we're very unlikely to see a reading of 7 V. We'll use this to our advantage in this attack: if <math>f(x)</math> is very small for one of our subkey guesses, it's probably a wrong guess. | ||
− | == Multivariate Statistics == | + | === Multivariate Statistics === |
The 1-variable Gaussian distribution works well for one measurement. What if we're working with more than one random variable? | The 1-variable Gaussian distribution works well for one measurement. What if we're working with more than one random variable? | ||
Line 80: | Line 80: | ||
Don't worry if this looks crazy - the SciPy package in Python will do all the heavy lifting for us. As with the single-variable distributions, we're going to use this to find how likely a certain observation is. In other words, if we put <math>k</math> points of our power trace into <math>\mathbf{x}</math> and we find that <math>f(\mathbf{x})</math> is very high, then we've probably found a good guess. | Don't worry if this looks crazy - the SciPy package in Python will do all the heavy lifting for us. As with the single-variable distributions, we're going to use this to find how likely a certain observation is. In other words, if we put <math>k</math> points of our power trace into <math>\mathbf{x}</math> and we find that <math>f(\mathbf{x})</math> is very high, then we've probably found a good guess. | ||
− | = Creating the Template = | + | == Creating the Template == |
A template is a set of probability distributions that describe what the power traces look like for many different keys. Effectively, a template says: "If you're going to use key <math>k</math>, your power trace will look like the distribution <math>f_k(\mathbf{x})</math>". We can use this information to find subtle differences between power traces and to make very good key guesses for a single power trace. | A template is a set of probability distributions that describe what the power traces look like for many different keys. Effectively, a template says: "If you're going to use key <math>k</math>, your power trace will look like the distribution <math>f_k(\mathbf{x})</math>". We can use this information to find subtle differences between power traces and to make very good key guesses for a single power trace. | ||
− | == Number of Traces == | + | === Number of Traces === |
One of the downsides of template attacks is that they require a great number of traces to be preprocessed before the attack can begin. This is mainly for statistical reasons. In order to come up with a good distribution to model the power traces for ''every key'', we need a large number of traces for ''every key''. For example, if we're going to attack a single subkey of AES-128, then we need to create 256 power consumption models (one for every number from 0 to 255). In order to get enough data to make good models, we need tens of thousands of traces. | One of the downsides of template attacks is that they require a great number of traces to be preprocessed before the attack can begin. This is mainly for statistical reasons. In order to come up with a good distribution to model the power traces for ''every key'', we need a large number of traces for ''every key''. For example, if we're going to attack a single subkey of AES-128, then we need to create 256 power consumption models (one for every number from 0 to 255). In order to get enough data to make good models, we need tens of thousands of traces. | ||
Note that we don't have to model every single key. One good alternative is to model a sensitive part of the algorithm, like the substitution box in AES. We can get away with a much smaller number of traces here; if we make a model for every possible Hamming weight, then we would end up with 9 models, which is an order of magnitude smaller. However, then we can't recover the key from a single attack trace - we need more information to recover the secret key. | Note that we don't have to model every single key. One good alternative is to model a sensitive part of the algorithm, like the substitution box in AES. We can get away with a much smaller number of traces here; if we make a model for every possible Hamming weight, then we would end up with 9 models, which is an order of magnitude smaller. However, then we can't recover the key from a single attack trace - we need more information to recover the secret key. | ||
− | == Points of Interest == | + | === Points of Interest === |
Our goal is to create a multivariate probability describing the power traces for every possible key. If we modeled the entire power trace this way (with, say, 3000 samples), then we would need a 3000-dimension distribution. This is insane, so we'll find an alternative. | Our goal is to create a multivariate probability describing the power traces for every possible key. If we modeled the entire power trace this way (with, say, 3000 samples), then we would need a 3000-dimension distribution. This is insane, so we'll find an alternative. | ||
Line 96: | Line 96: | ||
These two points mean that we can usually live with a handful (3-5) of ''points of interest''. If we can pick out good points and write down a model using these samples, then we can use a 3D or 5D distribution - a great improvement over the original 3000D model. | These two points mean that we can usually live with a handful (3-5) of ''points of interest''. If we can pick out good points and write down a model using these samples, then we can use a 3D or 5D distribution - a great improvement over the original 3000D model. | ||
− | === Picking POIs === | + | ==== Picking POIs ==== |
− | '' | + | There are several ways to pick the most important points in each of the traces. Generally, the aim is to find points that vary strongly between different operations (subkeys or Hamming weights). The simplest method -- the one that we'll use here -- is the ''sum of differences'' method. |
− | == Analyzing the Data == | + | The algorithm for the sum of difference method is: |
+ | * For every operation <math>k</math> and every sample <math>i</math>, find the average power <math>M_{k, i}</math>. For instance, if there are <math>T_k</math> traces where we performed operation <math>k</math>, then this average is | ||
+ | |||
+ | <math> | ||
+ | M_{k, i} = \frac{1}{T_k} \sum_{j=1}^{T_k} t_{j, i} | ||
+ | </math> | ||
+ | |||
+ | * After finding all of the means, calculate all of their absolute pairwise differences. Add these up. This will give one "trace" which has peaks where the samples are usually different. The calculation looks like | ||
+ | |||
+ | <math> | ||
+ | D_{i} = \sum_{k_1, k_2} |M_{k_1, i} - M_{k_2, i}| | ||
+ | </math> | ||
+ | |||
+ | An example of this sum of differences is: | ||
+ | |||
+ | [[File:Template-Sum-Of-Difference.png|600px]] | ||
+ | |||
+ | * The peaks of <math>D_i</math> show the most important points, but we need to satisfy point 1 from above - we need to pick some peaks that aren't too close. One algorithm to do this is: | ||
+ | # Pick the highest point in <math>D_i</math> and save this value of <math>i</math> as a point of interest. (ie: <math>i = argmax(D_i)</math>) | ||
+ | # Throw out the nearest <math>N</math> points (where <math>N</math> is the minimum spacing between POIs). | ||
+ | # Repeat until enough POIs have been selected. | ||
+ | |||
+ | === Analyzing the Data === | ||
Suppose that we've picked <math>I</math> points of interest, which are at samples <math>s_i</math> (<math>0 \le i < I</math>). Then, our goal is to find a mean and covariance matrix for every operation (every choice of subkey or intermediate Hamming weight). Let's say that there are <math>K</math> of these operations (maybe 256 subkeys or 9 possible Hamming weights). | Suppose that we've picked <math>I</math> points of interest, which are at samples <math>s_i</math> (<math>0 \le i < I</math>). Then, our goal is to find a mean and covariance matrix for every operation (every choice of subkey or intermediate Hamming weight). Let's say that there are <math>K</math> of these operations (maybe 256 subkeys or 9 possible Hamming weights). | ||
Line 146: | Line 168: | ||
These steps must be done for every operation <math>k</math>. At the end of this preprocessing, we'll have <math>K</math> mean and covariance matrices, modelling each of the <math>K</math> different operations that the target can do. | These steps must be done for every operation <math>k</math>. At the end of this preprocessing, we'll have <math>K</math> mean and covariance matrices, modelling each of the <math>K</math> different operations that the target can do. | ||
− | = Using the Template = | + | == Using the Template == |
With a template in hand, we can finish our attack. For the attack, we need a smaller number of traces - we'll say that we have <math>A</math> traces. The sample values will be labeled <math>a_{j, s_i}</math> (<math>1 \le j \le A</math>). | With a template in hand, we can finish our attack. For the attack, we need a smaller number of traces - we'll say that we have <math>A</math> traces. The sample values will be labeled <math>a_{j, s_i}</math> (<math>1 \le j \le A</math>). | ||
− | == Applying the Template == | + | === Applying the Template === |
First, let's apply the template to a single trace. Our job is to decide how likely all of our key guesses are. We need to do the following: | First, let's apply the template to a single trace. Our job is to decide how likely all of our key guesses are. We need to do the following: | ||
* Put our trace values at the POIs into a vector. This vector will be | * Put our trace values at the POIs into a vector. This vector will be | ||
Line 173: | Line 195: | ||
This process gives us an array of <math>p_{k, j}</math>, which says: "Looking at trace <math>j</math>, how likely is it that key <math>k</math> is the correct one?" | This process gives us an array of <math>p_{k, j}</math>, which says: "Looking at trace <math>j</math>, how likely is it that key <math>k</math> is the correct one?" | ||
− | == Combining the Results == | + | === Combining the Results === |
The very last step is to combine our <math>p_{k, j}</math> values to decide which key is the best fit. The easiest way to do this is to combine them as | The very last step is to combine our <math>p_{k, j}</math> values to decide which key is the best fit. The easiest way to do this is to combine them as | ||
Line 190: | Line 212: | ||
Comparing these logarithms will give us the same results without the precision issues. | Comparing these logarithms will give us the same results without the precision issues. | ||
− | == Attack Time == | + | === Attack Time === |
The number of attack traces required to complete a template attack can vary wildly depending on the quality of the preprocessing. As described in the original papers on template attacks (Chari, Rao, and Rohatgi), when using high-quality templates made from many traces, it is possible to attack a system with a single trace. In the ChipWhisperer tutorials, we'll save ourselves a bit of processing time and only record a few thousand traces for generating the templates, meaning that we'll need more attack traces to recover the key from the victim. | The number of attack traces required to complete a template attack can vary wildly depending on the quality of the preprocessing. As described in the original papers on template attacks (Chari, Rao, and Rohatgi), when using high-quality templates made from many traces, it is possible to attack a system with a single trace. In the ChipWhisperer tutorials, we'll save ourselves a bit of processing time and only record a few thousand traces for generating the templates, meaning that we'll need more attack traces to recover the key from the victim. | ||
It may be interesting to experiment with different amounts of processing. Can you break AES in one trace? How many template traces does it take? | It may be interesting to experiment with different amounts of processing. Can you break AES in one trace? How many template traces does it take? | ||
+ | |||
+ | [[Category:Theory]] |
Latest revision as of 05:44, 1 May 2018
Template attacks are a powerful type of side-channel attack. These attacks are a subset of profiling attacks, where an attacker creates a "profile" of a sensitive device and applies this profile to quickly find a victim's secret key.
Template attacks require more setup than CPA attacks. To perform a template attack, the attacker must have access to another copy of the protected device that they can fully control. Then, they must perform a great deal of pre-processing to create the template - in practice, this may take dozens of thousands of power traces. However, the advantages are that template attacks require a very small number of traces from the victim to complete the attack. With enough pre-processing, the key may be able to be recovered from just a single trace.
There are four steps to a template attack:
- Using a copy of the protected device, record a large number of power traces using many different inputs (plaintexts and keys). Ensure that enough traces are recorded to give us information about each subkey value.
- Create a template of the device's operation. This template notes a few "points of interest" in the power traces and a multivariate distribution of the power traces at each point.
- On the victim device, record a small number of power traces. Use multiple plaintexts. (We have no control over the secret key, which is fixed.)
- Apply the template to the attack traces. For each subkey, track which value is most likely to be the correct subkey. Continue until the key has been recovered.
Contents
Signals, Noise, and Statistics
Before looking at the details of the template attack, it is important to understand the statistics concepts that are involved. A template is effectively a multivariate distribution that describes several key samples in the power traces. This section will describe what a multivariate distribution is and how it can be used in this context.
Noise Distributions
Electrical signals are inherently noisy. Any time we take a voltage measurement, we don't expect to see a perfect, constant level. For example, if we attached a multimeter to a 5 V source and took 4 measurements, we might expect to see a data set like (4.95, 5.01, 5.06, 4.98). One way of modelling this voltage source is
where is the noise-free level and is the additional noise. In our example, would be exactly 5 V. Then, is a random variable: every time we take a measurement, we can expect to see a different value. Note that and are bolded to show that they are random variables.
A simple model for these random variables uses a Gaussian distribution (read: a bell curve). The probability density function (PDF) of a Gaussian distribution is
where is the mean and is the standard deviation. For instance, our voltage source might have a mean of 5 and a standard deviation of 0.5, making the PDF look like:
We can use the PDF to calculate how likely a certain measurement is. Using this distribution,
so we're very unlikely to see a reading of 7 V. We'll use this to our advantage in this attack: if is very small for one of our subkey guesses, it's probably a wrong guess.
Multivariate Statistics
The 1-variable Gaussian distribution works well for one measurement. What if we're working with more than one random variable?
Suppose we're measuring two voltages that have some amount of noise on them. We'll call them and . As a first attempt, we could write down a model for using a normal distribution and a separate model for using a different distribution. However, this might not always make sense. If we write two separate distributions, what we're saying is that the two variables are independent: when goes up, there's no guarantee that will follow it.
Multivariate distributions let us model multiple random variables that may or may not be correlated. In a multivariate distribution, instead of writing down a single variance , we keep track of a whole matrix of covariances. For example, to model three random variables (), this matrix would be
Also, note that this distribution needs to have a mean for each random variable:
The PDF of this distribution is more complicated: instead of using a single number as an argument, it uses a vector with all of the variables in it (). The equation for random variables is
Don't worry if this looks crazy - the SciPy package in Python will do all the heavy lifting for us. As with the single-variable distributions, we're going to use this to find how likely a certain observation is. In other words, if we put points of our power trace into and we find that is very high, then we've probably found a good guess.
Creating the Template
A template is a set of probability distributions that describe what the power traces look like for many different keys. Effectively, a template says: "If you're going to use key , your power trace will look like the distribution ". We can use this information to find subtle differences between power traces and to make very good key guesses for a single power trace.
Number of Traces
One of the downsides of template attacks is that they require a great number of traces to be preprocessed before the attack can begin. This is mainly for statistical reasons. In order to come up with a good distribution to model the power traces for every key, we need a large number of traces for every key. For example, if we're going to attack a single subkey of AES-128, then we need to create 256 power consumption models (one for every number from 0 to 255). In order to get enough data to make good models, we need tens of thousands of traces.
Note that we don't have to model every single key. One good alternative is to model a sensitive part of the algorithm, like the substitution box in AES. We can get away with a much smaller number of traces here; if we make a model for every possible Hamming weight, then we would end up with 9 models, which is an order of magnitude smaller. However, then we can't recover the key from a single attack trace - we need more information to recover the secret key.
Points of Interest
Our goal is to create a multivariate probability describing the power traces for every possible key. If we modeled the entire power trace this way (with, say, 3000 samples), then we would need a 3000-dimension distribution. This is insane, so we'll find an alternative.
Thankfully, not every point on the power trace is important to us. There are two main reasons for this:
- We might be taking more than one sample per clock cycle. (Through most of the ChipWhisperer tutorials, our ADC runs four times faster than the target device.) There's no real reason to use all of these samples - we can get just as much information from a single sample at the right time.
- Our choice of key doesn't affect the entire power trace. It's likely that the subkeys only influence the power consumption at a few critical times. If we can pick these important times, then we can ignore most of the samples.
These two points mean that we can usually live with a handful (3-5) of points of interest. If we can pick out good points and write down a model using these samples, then we can use a 3D or 5D distribution - a great improvement over the original 3000D model.
Picking POIs
There are several ways to pick the most important points in each of the traces. Generally, the aim is to find points that vary strongly between different operations (subkeys or Hamming weights). The simplest method -- the one that we'll use here -- is the sum of differences method.
The algorithm for the sum of difference method is:
- For every operation and every sample , find the average power . For instance, if there are traces where we performed operation , then this average is
- After finding all of the means, calculate all of their absolute pairwise differences. Add these up. This will give one "trace" which has peaks where the samples are usually different. The calculation looks like
An example of this sum of differences is:
- The peaks of show the most important points, but we need to satisfy point 1 from above - we need to pick some peaks that aren't too close. One algorithm to do this is:
- Pick the highest point in and save this value of as a point of interest. (ie: )
- Throw out the nearest points (where is the minimum spacing between POIs).
- Repeat until enough POIs have been selected.
Analyzing the Data
Suppose that we've picked points of interest, which are at samples (). Then, our goal is to find a mean and covariance matrix for every operation (every choice of subkey or intermediate Hamming weight). Let's say that there are of these operations (maybe 256 subkeys or 9 possible Hamming weights).
For now, we'll look at a single operation (). The steps are:
- Find every power trace that falls under the category of "operation ". (ex: find every power trace where we used a subkey of 0x01.) We'll say that there are of these, so means the value at trace and POI .
- Find the average power at every point of interest. This calculation will look like:
- Find the variance of the power at each point of interest. One way of calculating this is:
- Find the covariance between the power at every pair of POIs ( and ). One way of calculating this is:
- Put together the mean and covariance matrices as:
These steps must be done for every operation . At the end of this preprocessing, we'll have mean and covariance matrices, modelling each of the different operations that the target can do.
Using the Template
With a template in hand, we can finish our attack. For the attack, we need a smaller number of traces - we'll say that we have traces. The sample values will be labeled ().
Applying the Template
First, let's apply the template to a single trace. Our job is to decide how likely all of our key guesses are. We need to do the following:
- Put our trace values at the POIs into a vector. This vector will be
- Calculate the PDF for every key guess and save these for later. This might look like:
- Repeat these two steps for all of the attack traces.
This process gives us an array of , which says: "Looking at trace , how likely is it that key is the correct one?"
Combining the Results
The very last step is to combine our values to decide which key is the best fit. The easiest way to do this is to combine them as
For example, if we guessed that a subkey was equal to 0x00 and our PDF results in 3 traces were (0.9, 0.8, 0.95), then our overall result would be 0.684. Having one trace that doesn't match the template can cause this number to drop quickly, helping us eliminate the wrong guesses. Finally, we can pick the highest value of , which tells us which guess fits the templates the best, and we're done!
This method of combining our per-trace results can suffer from precision issues. After multiplying many large or small numbers together, we could end up with numbers that are too large or small to fit into a floating point variable. An easy fix is to work with logarithms. Instead of using directly, we can calculate
Comparing these logarithms will give us the same results without the precision issues.
Attack Time
The number of attack traces required to complete a template attack can vary wildly depending on the quality of the preprocessing. As described in the original papers on template attacks (Chari, Rao, and Rohatgi), when using high-quality templates made from many traces, it is possible to attack a system with a single trace. In the ChipWhisperer tutorials, we'll save ourselves a bit of processing time and only record a few thousand traces for generating the templates, meaning that we'll need more attack traces to recover the key from the victim.
It may be interesting to experiment with different amounts of processing. Can you break AES in one trace? How many template traces does it take?