An online template attack (OTA) is a powerful technique previously used to attack elliptic curve scalar multiplication algorithms. This attack has only been analyzed in the realm of power consumption and EM side channels, where the signals leak related to the value being processed. However, microarchitecture signals have no such feature, invalidating some assumptions from previous OTA works. In this paper, we revisit previous OTA descriptions, proposing a generic framework and evaluation metrics for any side-channel signal. Our analysis reveals OTA features not previously considered, increasing its application scenarios and requiring a fresh countermeasure analysis to prevent it. In this regard, we demonstrate that OTAs can work in the backward direction, allowing to mount an augmented projective coordinates attack with respect to the proposal by Naccache, Smart and Stern (Eurocrypt 2004). This demonstrates that randomizing the initial targeted algorithm state does not prevent the attack as believed in previous works. We analyze three libraries libgcrypt, mbedTLS, and wolfSSL using two microarchitecture side channels. For the libgcrypt case, we target its EdDSA implementation using Curve25519 twist curve. We obtain similar results for mbedTLS and wolfSSL with curve secp256r1. For each library, we execute extensive attack instances that are able to recover the complete scalar in all cases using a single trace. This work demonstrates that microarchitecture online template attacks are also very powerful in this scenario, recovering secret information without knowing a leakage model. This highlights the importance of developing secure-by-default implementations, instead of fix-on-demand ones.
翻译:在线模板攻击( OTA) 是一种强大的技术, 先前用来攻击椭圆曲线缩缩缩缩缩缩缩图乘法。 此次攻击只是在电量消耗和EM侧渠道范围内分析, 信号与所处理的价值有关, 但是微结构信号没有这样的特征, 使先前 OTA 工作的一些假设无效。 在本文中, 我们重新审视先前 OTA 描述, 对任何侧通道信号提出通用框架和评估度量。 我们的分析揭示了 OTA 以前没有考虑过的特性, 增加了应用方案, 需要一种新的反制分析来防止它。 在这方面, 我们证明 OTA 可以向后方向工作, 允许对Nacachche、 Smart和 Stern( Europlecrypt, 2004) 的提议进行强化的工程坐标攻击。 这表明, 随机调整最初的目标算法状态并不会阻止先前工作中所相信的攻击。 我们分析了三个图书馆的ligcgcrycryct, mbedTLS, 和LolfSS 侧管道的完整。 对于ligcchryptryctroprocle 来说, 我们用SAA a creal decreal decreal listreval listrational laft laft cust mastreval cust ex ex a sreal a sreal ex ex ex ex a sreal ex ex a sreal destreval ex