International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Recovering the CTR_DRBG state in 256 traces

Authors:
Lauren De Meyer , KU Leuven, imec - COSIC
Download:
DOI: 10.13154/tches.v2020.i1.37-65
URL: https://tches.iacr.org/index.php/TCHES/article/view/8392
Search ePrint
Search Google
Abstract: The NIST CTR_DRBG specification prescribes a maximum size on each random number request, limiting the number of encryptions in CTR mode with the same key to 4 096. Jaffe’s attack on AES in CTR mode without knowledge of the nonce from CHES 2007 requires 216 traces, which is safely above this recommendation. In this work, we exhibit an attack that requires only 256 traces, which is well within the NIST limits. We use simulated traces to investigate the success probability as a function of the signal-to-noise ratio. We also demonstrate its success in practice by attacking an AES-CTR implementation on a Cortex-M4 among others and recovering both the key and nonce. Our traces and code are made openly available for reproducibility.
Video from TCHES 2019
BibTeX
@article{tches-2019-29954,
  title={Recovering the CTR_DRBG state in 256 traces},
  journal={IACR Transactions on Cryptographic Hardware and Embedded Systems},
  publisher={Ruhr-Universität Bochum},
  volume={2020, Issue 1},
  pages={37-65},
  url={https://tches.iacr.org/index.php/TCHES/article/view/8392},
  doi={10.13154/tches.v2020.i1.37-65},
  author={Lauren De Meyer},
  year=2019
}