Key Finding Attacks are attacks on computer systems that make use of
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
in which
computer memory
In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term ''memory'' is often synonymous with the term '' primary storag ...
or non-volatile storage is searched for private
cryptographic keys
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key c ...
that can be used to decrypt or sign data. The term is generally used in the context of attacks which search memory much more efficiently than simply testing each sequence of bytes to determine if it provides the correct answer. They are often used in combination with
cold boot attack
In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) b ...
s to extract key material from computers.
Approaches
In their seminal paper
on Key Finding attacks,
Shamir and
van Someren proposed two different approaches to key finding: statistical or entropic key finding and analytical key finding. The former relies on detecting differences in the statistical properties of the data that make up cryptographic keys while the later relies on determining specific byte patterns that must necessarily exist in the target key material and looking for these patterns.
Statistical key finding
In general for most cryptographic systems the cryptographic keys should be as random as possible. For most
symmetric ciphers the keys can and should be a truly random set of bits. For most
asymmetric ciphers the private keys are either numbers chosen at random with certain constraints (such as
primality
A prime number (or a prime) is a natural number greater than 1 that is not a product of two smaller natural numbers. A natural number greater than 1 that is not prime is called a composite number. For example, 5 is prime because the only ways ...
or being
generators in a group) or are the result of computations based on a set of random numbers with some constraints. In either case the key material exhibits high
entropy
Entropy is a scientific concept, as well as a measurable physical property, that is most commonly associated with a state of disorder, randomness, or uncertainty. The term and the concept are used in diverse fields, from classical thermodynam ...
. In contrast to this, most
uncompressed data in a computer's memory has relatively low entropy. As a result, if a key is known to exist in memory in its raw form then it is likely to stand out against the background of non-key data by virtue of its high entropy and an attacker needs to only test for matching keys in areas of memory or storage that have high entropy.
The contrast between the low entropy of most data and the high entropy of key data is sufficient as to be apparent by visual inspection. The image to the right shows an example of this.
Analytical key finding
While statistical key finding can be effective for reducing the amount of memory that needs to be searched, it still requires high-entropy areas to be tested to check if they contain the correct key material. In certain cases, particularly in the context of
public key encryption systems, it is possible to determine patterns that must occur in the key material and then limit the search to areas where these patterns are found.
Shamir and
van Someren demonstrated one example of this analytical approach for finding private
RSA keys where the public key is known and has a small public exponent. In the RSA system the public key is a pair
, where
with p and q being two large primes. The corresponding private key is
(or sometimes
or some variant thereof) where
, which is to say that e multiplied by d is equivalent to 1, modulo
where φ represents
Euler's totient function and is the size of the multiplicative group modulo n. In the case of an RSA key:
Finding the value of
from n allows for the
factorization
In mathematics, factorization (or factorisation, see English spelling differences) or factoring consists of writing a number or another mathematical object as a product of several ''factors'', usually smaller or simpler objects of the same kind ...
of n and the security of the RSA cryptosystem rests on the difficulty of doing so. As such an attacker cannot determine ''d'' exactly, given ''e'' and ''n''. An attack can however know a fair amount about what ''d'' looks like, given the knowledge that ''p'' and ''q'' are typically chosen to be the same length in bits and are both 'close' to the square root of ''n''. Thus an attacker can approximate a guess of:
and typically this approximation will be correct in the more significant half of its bits of its binary representation. The relationship of e and d means that:
where the exact value of ''k'' is unknown but
Using this fact and the approximation
, the attacker can enumerate a set of possible values for the top half of the binary representation of ''d'' for each possible value of ''k''. These binary patterns can be tested for many orders of magnitude faster than performing a trail decryption. Furthermore, in the common case of
it can be shown that
which allows the top half of the bits of ''d'' to be determined exactly and searched for directly.
Application
Key finding attacks have been used in conjunction with cold boot attacks to extract keys from machines after they have been switched off.
Heninger and Shacham showed that keys can be extracted even when the data in memory has been corrupted by having the power removed.
Statistical key finding was used by
Nicko van Someren to locate the signature verification keys used by Microsoft to validate the signatures on MS-CAPI plug-ins. One of these key was later discovered to be referred to as the
NSAKEY by Microsoft, sparking some controversy.
Mitigations
Key finding attacks can be mitigated in several ways. For analytic attacks, randomized key
blinding will prevent the expected patterns from being found in memory as well as protecting against some other sorts of
side-channel attack
In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algori ...
. Statistical attacks can be made less effective by storing other sorts of high-entropy or compressed data in memory and key material can be spread over a larger block of memory when not in use to reduce the concentration of entropy in one place.
References
{{reflist
Hacking (computer security)