Mobile Appliance Security: Challenges and Concerns
Download
Report
Transcript Mobile Appliance Security: Challenges and Concerns
Mobile Appliance Security:
Concerns and Challenges
Mahesh Mamidipaka
ICS 259: Seminar in Design Science
1. Securing Mobile Appliances: New Challenges for the System Designer
- A. Raghunathan, S. Ravi, S. Hattangady, J. Quisquater (DATE’ 03)
2. Masking Energy Behavior of DES Encryption
- H. Saputra, N. Vijaykrishnan, N. Kandemir, et al. (DATE’ 03)
3. Wireless Network Security - Tom Karrygiannis and Jes Owens, NIST
http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf
Outline
Introduction
Security Concerns
Design Challenges
Security Attacks on Smart Cards
– Power analysis based attack
Masking Energy Behavior for DES
Encryption (DATE’ 03)
Introduction
Mobile appliances widely used (PDAs, Cell
Phones, Smart Cards, etc.)
Involves sensitive information: increased
security concerns
Success of emerging technologies to
depend on ensuring adequate security
– Security cited as single largest concern among
prospective m-commerce users
Unique Challenges
Knowledge and experience from wired
internet gives us a head start (not sufficient)
Unique challenges:
– Use of public transmission medium
– Potentially unlimited points of access
– Vulnerable to theft, loss, and corruptibility
– Constraints on power, cost, and weight
Need for techniques at every aspect of
design to meet the challenges
Outline
Introduction
Security Concerns
Design Challenges
Security Attacks on Smart Cards
Masking Energy Behavior for DES
Encryption
Security Issues
Tamper-resistant
Implementation
Secure SW
Execution
User
Identification
Secure
Storage
Secure
Content
Secure Data
Communication
Secure Network
Access
Secure Data Communication
Employ security protocols to various layers of
network protocol stack
– Achieve peer authentication, privacy, data integrity etc.
– cryptographic algorithms act as building blocks
Examples Network layer protocols:
– Cellular technologies: GSM, CDPD
– Wireless LAN: IEEE 802.11
– Wireless PAN: Bluetooth
Distinct protocols needed at various layers
– Network layer protocol secures link between wireless
client, access point, base station or gateway
– Need complementary security mechanisms at higher
protocol layers (Eg. WTLS in WAP)
Outline
Introduction
Security Concerns
Design Challenges
Security Attacks on Smart Cards
Masking Energy Behavior for DES
Encryption
Design Challenges
Various challenges and considerations for
mobile appliance security
– Flexible security architecture: to support diverse
security protocols and crypto algorithms
– Computational requirement for security
processing
– Impact of security processing on battery life
– Tamper-resistant implementation
Flexibility
Ability to cater wide variety of security protocols
– Example: Support for both WEP and 3GPP algorithms
to work in LAN and 3G cellular environments
Support for distinct security standards at different
layers of network protocol stack
– Example: WEP (link layer) and SSL (transport layer)
support for wireless LAN enabled PDA with web support
Security protocols continuously evolving
– Protocols revised to enable new security services, new
crypto algorithms etc.
Computational Requirements
Processing Requirements for a security protocol using RSA based
Connection 3DES based encryption/decryption and SHA based integrity
Battery life
Reduced battery life due to increased
computational requirements
Case study: Sensor node with Motorola
Dragon Ball processor (MC68328)
Energy Consumption:
– Transmission: 21.5 mJ/KB
– Reception: 14.3 mJ/KB
– RSA based encryption:
42mJ/KB
Tamper-Resistance
Security protocols and mechanisms are
independent of implementation specifics
– Assumption being malicious entities do not have access
to implementation
Observing properties of the implementation can
enable breaking of ‘secret key’
Sensitive data is vulnerable
– During on-chip communication
– When simply stored in mobile appliance (secondary
storage like flash, main memory, caches, register files)
Outline
Introduction
Security Concerns
Design Challenges
Security Attacks on Smart Cards
Masking Energy Behavior for DES
Encryption
Security Attacks on Smart Cards
Security attacks on smart cards can be classified
as:
– Microprobing
Invasive technique that manipulates the internal circuits
– Software attacks
Focuses on protocol or algorithm weakness
– Eavesdropping
Hacks secret keys by monitoring power consumption, EM
radiation, and execution time
– Fault generation
Based on intentional malfunction of the circuit
Techniques like supply voltage change, exposing circuit to
radiation etc.
Eavesdropping power profile
Rationale: Power consumption of an operation
depends on its operand values
– Operands are plain text and secret key in crypto
algorithms
– Switching activity varies in memory, buses, datapath
units, and pipeline registers based on operand values
Different degrees of sophistication involved in
power analysis based attacks
– Simple Power Analysis (SPA): uses single power profile
– Differential Power Analysis (DPA): uses power profiles
from multiple runs
Simple Power Analysis
Based on single power trace for operations
Identify operations being performed based on
power profile
– Whether a branch is taken or not
– Whether an exponentiation operation is performed or
not
Knowing the algorithm and power profile, secret
key can be revealed
Protection from SPA:
– Code restructuring
– Random noise insertion for power variation
– Adding dummy modules
Differential Power Analysis
Utilizes power profiles gathered from multiple runs
Basic principle similar to SPA: relies on data
dependent power variation to break key
Averaging used to eliminate random noises
P.Kocher, J. Jaffer, and B. Jun “Introduction to
Differential Power Analysis and Related Attacks”,
http://www.cryptography.com/dpa/technical, 1998
Outline
Introduction
Security Concerns
Design Challenges
Security Attacks on Smart Cards
Masking Energy Behavior for DES
Encryption
Energy Masking for DES
Architecture to have secure and non-secure
instructions
– Power consumption for secure instructions data
independent
Critical operations in DES encryption:
–
–
–
–
Assignment
Bit by bit addition modulo 2 (XOR)
Shift operation
Indexing operation
Instructions involving secret key replaced with
secure instructions
Secure load instruction
Energy consumption profiles
Masking energy in DES
Energy consumption more for secure
instructions than non-secure instructions
– EDiss w/o masking: 46.4 uJ
– EDiss w/ naïve masking: 63.6 uJ (all loads and
stores masked)
– EDiss w/ smart masking: 52.6 uJ (only ‘secret
key’ related instructions masked)
Back to presentation