<node id="625051">
  <nid>625051</nid>
  <type>event</type>
  <uid>
    <user id="27707"><![CDATA[27707]]></user>
  </uid>
  <created>1566565083</created>
  <changed>1566565083</changed>
  <title><![CDATA[PhD Defense by Monjur Alam]]></title>
  <body><![CDATA[<p><strong>Title: </strong>Making Crypto Libraries Robust&nbsp;Against Physical&nbsp;Side-Channel Attacks</p>

<p>&nbsp;</p>

<p>Monjur Alam</p>

<p>Ph.D. Candidate in Computer Science</p>

<p>School of Computer Science</p>

<p>College of Computing</p>

<p>Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p><strong>Date:</strong>&nbsp;Friday, September&nbsp;6, 2019</p>

<p><strong>Time:</strong>&nbsp;13:00 - 15:00&nbsp;(EST)</p>

<p><strong>Location:</strong>&nbsp;Klaus 3100</p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p><strong>Committee:</strong></p>

<p>Dr. Milos Prvulovic&nbsp;(Advisor), School of Computer Science, Georgia Institute of Technology</p>

<p>Dr. Alenka&nbsp;Zajic(Co-advisor), School of Computer Science, Georgia Institute of Technology</p>

<p>Dr.&nbsp;Alexandra&nbsp;Boldyreva, School of Computer Science, Georgia Institute of Technology</p>

<p>Dr.&nbsp;Raheem Beyah,&nbsp;School of Computer Science,&nbsp;Georgia Institute of Technology</p>

<p>Dr. Angelos Keromytis,&nbsp;School&nbsp;of&nbsp;Electrical and Computer Engineering,&nbsp;Georgia Institute of Technology</p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p>Abstract:</p>

<p>The connection between theoretical and applied cryptography is often not well established due to difficulties in translating the theoretical security proofs to real world software and hardware implementations. Physical side-channel cryptanalysis is a very effective approach to break a secure cryptographic system.&nbsp;Most side-channel attacks on cryptographic primitives and implementations rely on different control flow or memory access patterns. As a countermeasure, the cryptographic community has established the notion of constant time program code which&nbsp;avoids secret-dependent control flow and data access patterns.</p>

<p>&nbsp;</p>

<p>This thesis focuses on detailing a set of new techniques to exploit widely used open sources for software implementations of cryptographic primitives.&nbsp;&nbsp;First, we present&nbsp;One&amp;Done,&nbsp;&nbsp;a side-channel attack that is based on the analysis of signals that correspond to the brief computation activity that computes the value of each window during exponentiation, i.e. activity between large-integer multiplications.&nbsp;As the attack is message-independent, it makes the attack completely immune to existing countermeasures that focus on thwarting chosen-ciphertext attacks and/or square/multiply sequence analysis.&nbsp;Second, we present&nbsp;Nonce@Once, the first side-channel attack that recovers the secret scalar from the electromagnetic signal that corresponds to a single signing operation in current versions of Libgcrypt, OpenSSL. Our attack uses the signal differences created by systematic differences in operand values during a conditional swap operation itself to recover each bit of the secret.&nbsp;We also&nbsp;propose a mitigation that randomizes the exclusive-or mask in the conditional swap operation, is effective in preventing this and similar attacks. Next,&nbsp;we present a&nbsp;physical side-channel attack on DSA implementation, which utilizes constant-time fixed-window (m-ary) modular exponentiation.&nbsp;We demonstrated different implementation aspects and their effects as countermeasures which embrace the importance of re-thinking before designing and implementing PKC, in general. Lastly,&nbsp;We present the security issues on NAF based OpenSSL&#39;s ECDSA implementation.</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Making Crypto Libraries Robust Against Physical Side-Channel Attacks]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2019-09-06T14:00:00-04:00]]></value>
      <value2><![CDATA[2019-09-06T16:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>221981</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Graduate Studies]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>100811</tid>
        <value><![CDATA[Phd Defense]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
