The Mathematics of Side-Channel Attacks

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=R9yMLOJUw-Q



Duration: 1:00:34
1,862 views
22


We will look at a collection of mathematical problems suggested by side-channel attacks against public key cryptosystems, and how the techniques inspired by this work relate to a variety of different applications. First, we discuss the cold boot attack, a side-channel attack against disk encryption systems that uses the phenomenon of DRAM remanence to recover encryption keys from a running computer. In the course of the attack, however, there may be errors introduced in the keys that the attacker obtains. It turns out that the structure of the key data in an AES key schedule can allow an attacker to more efficiently recover the private key in the presence of such errors. We extend this idea to a RSA private keys, and show how the structure of RSA private key data can allow an attacker to recover a key in the presence of random errors from 27 of the bits of the original key. Most previous work on RSA key recovery used the lattice-based techniques introduced by Coppersmith for finding low-degree roots of polynomials modulo numbers of unknown factorization. We will show how powerful analogies from algebraic number theory allow us to translate this theorem from the ring of integers to the ring of polynomials and beyond. This sort of intellectual arbitrage allows us to give a faster algorithm for list decoding of Reed-Solomon codes along with a natural extension to multi-point algebraic geometric codes, as well as an algorithm to find small solutions to polynomials over ideals in number fields.




Other Videos By Microsoft Research


2016-08-16On the Fourier Spectrum of Symmetric Boolean Functions
2016-08-16Randomized Broadcast and Possible Connection to other Models
2016-08-16The Reconstruction Problem on the Tree
2016-08-16Information and Interactive Communication
2016-08-16The Impact of Visualization on Search and Discovery; ScienceCinema; Speech Processing Quaero
2016-08-16Interactive Illustrations; Delivering Interactive 3D Moleculars; Interactive Multimedia Publishing
2016-08-16Semantics of Innovation in Visualization; PivotViewer; Visualization of Ecological Data
2016-08-16Telling Stories in the Cloud; Communications from the Particle Frontier; Video Analytics
2016-08-16On Users' Mental Models of Security Controls
2016-08-16Why Don't Software Developers Use their Tools?
2016-08-16The Mathematics of Side-Channel Attacks
2016-08-16PyPy's Approach to Implementing Dynamic Languages Using a Tracing JIT Compiler
2016-08-16Fine-Grained Power Modeling for Smartphones Using System Call Tracing
2016-08-16Reputational Bargaining Under Knowledge of Rationality
2016-08-16We Will be Right With You: Managing Customers Expectations with Vague Promises and Cheap Talk
2016-08-16Information That Matters: Investigating Relevance of Entities in Social Media Networks
2016-08-16Efficient Bayesian Algorithmic Mechanism Design
2016-08-16Extreme Learning Machine: Learning Without Iterative Tuning
2016-08-16Extracting Knowledge from Networks: Rumors, Superstars, and Communities
2016-08-16Electrical Flows and Laplacian Systems: A New Tool for Graph Algorithms
2016-08-16Limit Theorems in Pseudorandomness and Learning Theory



Tags:
microsoft research