Hi Quynh:

Not sure where to start (there is vast literature on side channel attacks and other implementation attacks). A good starting point would be the book [1], but one could also look at some NIST publications [2].

Side channel attacks differs from cryptanalytic attacks in that it does not merely study I/O behavior of crypto contructs, but also looks into what information can be obtained from what is going on "under the hood" of the computations (power consumption, radiation, timing, etc; or even invasive attacks). Most commonly one looks at crypto building blocks, but ultimately side channels can comprise any system behavior ("Lucky13" does, e.g., exploit this, if I remember correctly).

From the last page of [2]: Finally, the most important conclusion from this paper is that it is not only a necessity but also a must, in the coming version of FIPS 140-3 standard, to evaluate cryptographic modules for their resistivity against SCA attacks.

Ref:
[1] Stefan Mangard, Elisabeth Oswald, Thomas Popp, "Power Analysis Attacks - Revealing the Secrets of Smart Cards", Springer, 2007. [2] http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-3/physec/papers/physecpaper19.pdf
[2]


On 2/10/2017 1:47 PM, Dang, Quynh (Fed) wrote:
Hi Rene,

From: TLS <tls-boun...@ietf.org <mailto:tls-boun...@ietf.org>> on behalf of Rene Struik <rstruik....@gmail.com <mailto:rstruik....@gmail.com>>
Date: Friday, February 10, 2017 at 10:51 AM
To: Sean Turner <s...@sn3rd.com <mailto:s...@sn3rd.com>>, "<tls@ietf.org <mailto:tls@ietf.org>>" <tls@ietf.org <mailto:tls@ietf.org>>
Cc: IRTF CFRG <c...@irtf.org <mailto:c...@irtf.org>>
Subject: Re: [TLS] [Cfrg] Closing out tls1.3 "Limits on key usage" PRs (#765/#769)

    Dear colleagues:

    I would suggest adding the following paragraph at the end of
    Section 5.5:

    [current text of Section 5.5]

    There are cryptographic limits on the amount of plaintext which
    can be safely encrypted under a given set of keys.[AEAD-LIMITS]
    <https://tlswg.github.io/tls13-spec/#AEAD-LIMITS>provides an
    analysis of these limits under the assumption that the underlying
    primitive (AES or ChaCha20) has no weaknesses. Implementations
    SHOULD do a key updateSection 4.6.3
    <https://tlswg.github.io/tls13-spec/#key-update>prior to reaching
    these limits.

    For AES-GCM, up to 2^24.5 full-size records (about 24 million) may
    be encrypted on a given connection while keeping a safety margin
    of approximately 2^-57 for Authenticated Encryption (AE) security.
    For ChaCha20/Poly1305, the record sequence number would wrap
    before the safety limit is reached.

    [suggested additional text]

    The above upper limits do not take into account potential side
    channel attacks, which - in some implementations - have been shown
    to be successful at recovering keying material with a relatively
    small number of messages encrypted using the same key. While
    results are highly implementation-specific, thereby making it hard
    to provide precise guidance, prudence suggests that
    implementations should not reuse keys ad infinitum.
    Implementations SHALL therefore always implement the key update
    mechanism of Section 4.6.3.

    {editorial note: perhaps, one should impose the limit 2^20, just
    to make sure people do not "forget" to implement key updates?}


How do you do side channel attacks on TLS ? Do these side-channel attacks work for AES-GCM only in TLS 1.3 ?




    See also my email of August 29, 2016:
    https://mailarchive.ietf.org/arch/msg/cfrg/SUuLDg0wTvjR7H46oNyEtyGVdno

    On 2/10/2017 12:07 AM, Sean Turner wrote:
    All,

    We’ve got two outstanding PRs that propose changes to draft-ietf-tls-tls13 
Section 5.5 “Limits on Key Usage”.  As it relates to rekeying, these limits 
have been discussed a couple of times and we need to resolve once and for all 
whether the TLS WG wants to:

    a) Close these two PRs and go with the existing text [0]
    b) Adopt PR#765 [1]
    c) Adopt PR#769 [2]

    Please indicate you preference to the TLS mailing list before Feb 17.  Note 
that unless there’s clear consensus to change the text will remain as is (i.e., 
option a).

    J&S

    [0]https://tlswg.github.io/tls13-spec/#rfc.section.5.5
    [1]https://github.com/tlswg/tls13-spec/pull/765
    [2]https://github.com/tlswg/tls13-spec/pull/769
    _______________________________________________
    Cfrg mailing list
    Cfrg@irtf.orghttps://www.irtf.org/mailman/listinfo/cfrg


-- email:rstruik....@gmail.com | Skype: rstruik
    cell: +1 (647) 867-5658 | US: +1 (415) 690-7363



--
email: rstruik....@gmail.com | Skype: rstruik
cell: +1 (647) 867-5658 | US: +1 (415) 690-7363

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to