practical algebraic attacks on the hitag2 tm stream cipher
play

Practical Algebraic Attacks on the HITAG2 TM Stream Cipher Nicolas T. - PowerPoint PPT Presentation

Practical Algebraic Attacks on the HITAG2 TM Stream Cipher Nicolas T. Courtois 1 Sean O Neil 2 Jean-Jacques Quisquater 3 1 - University College London, UK 2 - VEST Corporation, France 3 - Universit Catholique de Louvain, Belgium Algebraic


  1. Practical Algebraic Attacks on the HITAG2 TM Stream Cipher Nicolas T. Courtois 1 Sean O ’ Neil 2 Jean-Jacques Quisquater 3 1 - University College London, UK 2 - VEST Corporation, France 3 - Université Catholique de Louvain, Belgium

  2. Algebraic Attacks on Hitag 2 Cipher Disclaimer First of all, this pure crypto research: Spec of Algebraic the cipher => Attack. Not all attacks work on actual industrial systems due to the protocol subtleties. Moreover: one should not expect that every information found on the Internet is correct. One can expect some small glitches… 2 Courtois, O’Neil, Quisquater

  3. Algebraic Attacks on Hitag 2 Cipher Outline 1. Hitag2 cipher and products. 2. Discussion: open source vs. closed source crypto. 3. Algebraic attacks with SAT solvers. 4. Our results. 5. Industry impact, discussion. 3 Courtois, O’Neil, Quisquater

  4. Algebraic Attacks on Hitag 2 Cipher Hitag2 • A stream cipher used in car locks [e.g. BMW]: Philips Hitag2 family. • Also used in building access. – According to [Nohl, Plötz HAR’09] used in German government and army buildings… – But Hitag2 proximity cards are not available anymore in shops. They have been discontinued. Here we concentrate just on car locks. 4 Courtois, O’Neil, Quisquater

  5. Algebraic Attacks on Hitag 2 Cipher What ’ s Inside? 5 Courtois, O’Neil, Quisquater

  6. Algebraic Attacks on Hitag 2 Cipher Open Source vs. Closed Source Crypto 6 Courtois, O’Neil, Quisquater

  7. Algebraic Attacks on Hitag 2 Cipher Secrecy: Very frequently an obvious business decision. Creates entry barriers for competitors. • But also defends against hackers. • 7 Courtois, O’Neil, Quisquater

  8. Algebraic Attacks on Hitag 2 Cipher Kerckhoffs ’ principle: [1883] “ The system must remain secure should it fall in enemy hands …” 8 Courtois, O’Neil, Quisquater

  9. Algebraic Attacks on Hitag 2 Cipher *Remark: Smart Cards: They are already in ‘ enemy ’ hands - even more for RFID … 9 Courtois, O’Neil, Quisquater

  10. Algebraic Attacks on Hitag 2 Cipher Kerckhoffs ’ principle: [1883] Most of the time: incorrectly understood. No obligation to disclose. • Security when disclosed. • Better security when not disclosed??? 10 Courtois, O’Neil, Quisquater

  11. Algebraic Attacks on Hitag 2 Cipher Yes (1,2,3): 1. Military: layer the defences. 11 Courtois, O’Neil, Quisquater

  12. Algebraic Attacks on Hitag 2 Cipher Yes (2): 2) Basic economics: these 3 extra months (and not more � ) are simply worth a a lot of money. 12 Courtois, O’Neil, Quisquater

  13. Algebraic Attacks on Hitag 2 Cipher Yes (3): 3) Prevent the erosion of profitability / barriers for entry for competitors / “ inimitability ” 13 Courtois, O’Neil, Quisquater

  14. Algebraic Attacks on Hitag 2 Cipher Kerckhoffs principle is kind of WRONG in the world of smart cards Reasons: • side channel attacks are HARD and COSTLY to prevent when the algo is known • in some applications, for example Pay TV the system is broken immediately when the cryptographic algorithms are public. 14 Courtois, O’Neil, Quisquater

  15. Algebraic Attacks on Hitag 2 Cipher Kerckhoffs principle is kind of WRONG? Well OK, but then we need other means to evaluate evaluate evaluate evaluate crypto algorithms used by the industry. • [OLD] private consulting … • [NEW] TODAY: Automated Cryptanalysis Automated Cryptanalysis Automated Cryptanalysis Automated Cryptanalysis Spec of Try our the cipher => software 15 Courtois, O’Neil, Quisquater

  16. Algebraic Attacks on Hitag 2 Cipher Silicon Hacking 16 Courtois, O’Neil, Quisquater

  17. Algebraic Attacks on Hitag 2 Cipher Tarnovsky Lab [Freelance Silicon Hacker] Only a few thousands of dollars worth of equipment 17 Courtois, O’Neil, Quisquater

  18. Algebraic Attacks on Hitag 2 Cipher Clear and Present Danger Reverse engineering is NOT that hard. No need for a FIB device (Focused Ion Beam, 0.5 M € ). A few thousand dollars microscope +software. 18 Courtois, O’Neil, Quisquater

  19. Algebraic Attacks on Hitag 2 Cipher Silicon Hacking => Wikipedia TM 19 Courtois, O’Neil, Quisquater

  20. Algebraic Attacks on Hitag 2 Cipher 20 Courtois, O’Neil, Quisquater

  21. Algebraic Attacks on Hitag 2 Cipher Crypto-1 is VERY WEAK • Crypto 1 Has regular LFSR taps =>Broken in 0.05 seconds. [de Koning Gans et al, Esorics 2008] 21 Courtois, O’Neil, Quisquater

  22. Algebraic Attacks on Hitag 2 Cipher much better: • Crypto 1 Has regular LFSR taps • Crypto 1 Has regular LFSR taps Crypto 1 Has regular LFSR taps • =>Broken in 0.05 seconds . =>Broken in 0.05 seconds. . =>Broken in 0.05 seconds [de Koning Gans et al, Esorics 2008] [de Koning Gans Koning Gans et al, et al, Esorics Esorics 2008] 2008] [de • Hitag 2 has IRREGULAR taps. Not so easy. • State of the art: Inversion attacks: – [Ross Anderson: Searching for the Optimum Correlation Attack, In FSE’94] – Our present work is a sort of automated inversion attack where human insights into how to invert the augmented filter function are replaced by the [clever] SAT solver software… 22 Courtois, O’Neil, Quisquater

  23. Algebraic Attacks on Hitag 2 Cipher 23 Courtois, O’Neil, Quisquater

  24. Algebraic Attacks on Hitag 2 Cipher Silicon Hacking => Wikipedia A Cryptanalyst can start working … 24 Courtois, O’Neil, Quisquater

  25. Algebraic Attacks on Hitag 2 Cipher Circuit High-Level View of Hitag2 25 Courtois, O’Neil, Quisquater

  26. Algebraic Attacks on Hitag 2 Cipher Exhaustive Key Search • 48 bits, about 4 years on 1 CPU. • But only hours/days with more expensive devices such as FPGA/Copacobana etc… 26 Courtois, O’Neil, Quisquater

  27. Algebraic Attacks on Hitag 2 Cipher Algebraic Cryptanalysis 27 Courtois, O’Neil, Quisquater

  28. Algebraic Attacks on Hitag 2 Cipher Algebraic Cryptanalysis [Shannon] Breaking a « good » cipher should require: “as much work as solving a system of simultaneous equations in a large number of unknowns of a complex type” [Shannon, 1949] 28 Courtois, O’Neil, Quisquater

  29. Algebraic Attacks on Hitag 2 Cipher Algebraic Cryptanalysis: An Emerging Technology XSL Gartner ’ s Technology Hype Cycle AES 29 Courtois, O’Neil, Quisquater

  30. Algebraic Attacks on Hitag 2 Cipher Strong or Weak? High Algebraic Immunity. • Does NOT help. • Many “direct” algebraic attacks exist. – First mention of such attack: Ars-Faugère in their INRIA report: • Experimental attacks with a very small quantity of keystream. – Now we have a portfolio of techniques… We can break “any cipher”, if not too complex… 30 Courtois, O’Neil, Quisquater

  31. Algebraic Attacks on Hitag 2 Cipher “direct” algebraic attacks Our fastest attacks use algebraic equations + conversion + SAT solvers • [cf. recent attacks on DES and KeeLoq by Courtois and Bard 2007-08] 31 Courtois, O’Neil, Quisquater

  32. Algebraic Attacks on Hitag 2 Cipher Our Attacks …AC can break “any cipher”, if not too complex… Remark: • Other attacks can be faster. • However, this method is more generally applicable: • we can also break many modified versions of Hitag2 • and this without any human intervention ! 32 Courtois, O’Neil, Quisquater

  33. Algebraic Attacks on Hitag 2 Cipher Algebraic Cryptanalysis Step 1. Write a system of Multivariate Quadratic equations [MQ] Step 2. Solve it. 33 Courtois, O’Neil, Quisquater

  34. Algebraic Attacks on Hitag 2 Cipher Step 1 – Write Quadratic Equations Method? Follow Closely a gate-efficient implementation of the cipher. x z xy+1=z y This process can be fully automated. Better implementation (less NAND gates) => better attack � 34 Courtois, O’Neil, Quisquater

  35. Algebraic Attacks on Hitag 2 Cipher Step 2: Solve it. Theory: NP-hard problem… Practice: hopefully solvable…. 35 Courtois, O’Neil, Quisquater

  36. Algebraic Attacks on Hitag 2 Cipher ANF-to-CNF method - The Outsider [Courtois, Bard, Jefferson] Before we did try, we actually never believed it could work… � � � Convert MQ to a SAT problem. (both are NP-hard problems) 36 Courtois, O’Neil, Quisquater

  37. Algebraic Attacks on Hitag 2 Cipher *ANF-to-CNF – Main Idea Principle 1: each monomial = one dummy variable. d+1 clauses for each degree d monomial 37 Courtois, O’Neil, Quisquater

  38. Algebraic Attacks on Hitag 2 Cipher *Also Principle 2: Handling XORs – Not obvious. Long XORs known to be hard problems for SAT solvers. • Split longer XORs in several shorter with more dummy variables. • About 4 h clauses for a XOR of size h. 38 Courtois, O’Neil, Quisquater

  39. Algebraic Attacks on Hitag 2 Cipher *ANF-to-CNF This description is enough to produce a working version. Space for non-trivial optimisations. See: Gregory V. Bard, Nicolas T. Courtois and Chris Jefferson: “Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers”. eprint.iacr.org/2007/024 39 Courtois, O’Neil, Quisquater

Recommend


More recommend