Cold Boot Key Recovery by Solving Polynomial Systems with Noise
- 1.7k Downloads
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in ; the technique was called Cold Boot attacks. When considering block ciphers, such as the AES and DES, simple algorithms were also proposed in  to recover the cryptographic key from the observed set of round subkeys in memory (computed via the cipher’s key schedule operation), which were however subject to errors due to memory bits decay. In this work we extend this analysis to consider key recovery for other ciphers used in Full Disk Encryption (FDE) products. Our algorithms are also based on closest code word decoding methods, however apply a novel method for solving a set of non-linear algebraic equations with noise based on Integer Programming. This method should have further applications in cryptology, and is likely to be of independent interest. We demonstrate the viability of the Integer Programming method by applying it against the Serpent block cipher, which has a much more complex key schedule than AES. Furthermore, we also consider the Twofish key schedule, to which we apply a dedicated method of recovery.
KeywordsInteger Program Block Cipher Mixed Integer Programming Problem Integer Program Method Explicit Degree
- 1.Achterberg, T.: Constraint Integer Programming. PhD thesis, TU Berlin (2007), http://scip.zib.de
- 8.Feldman, J.: Decoding Error-Correcting Codes via Linear Programming. PhD thesis, Massachusetts Institute of Technology (2003)Google Scholar
- 9.Alex Halderman, J., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryption Keys. In: USENIX Security Symposium, USENIX Association, pp. 45–60 (2009)Google Scholar
- 10.Heninger, N., Shacham, H.: Reconstructing RSA Private Keys from Random Key Bits. Cryptology ePrint Archive, Report 2008/510 (2008)Google Scholar
- 11.Kamal, A.A., Youssef, A.M.: Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images. In: Proceedings of The Fourth International Conference on Emerging Security Information, Systems and Technologies – SECURWARE 2010, Venice/Mestre, Italy, July 18-25 (2010)Google Scholar
- 12.Lloyd, J.: Re: cold boot attacks on disk encryption. Message posted to The Cryptography Mailing List on February 21 (2008), archived at http://www.mail-archive.com/cryptography/metzdowd.com/msg08876.html
- 14.Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher (1998), http://www.schneier.com/paper-twofish-paper.pdf
- 15.Stein, W., et al.: Sage Mathematics Software (Version 4.4.1). The Sage Development Team (2010) http://www.sagemath.org
- 16.TrueCrypt Project, http://www.truecrypt.org/.