Global Sources
EE Times-India
EE Times-India > EDA/IP

Sophisticated cryptographic systems pose high risks

Posted: 23 Nov 2007     Print Version  Bookmark and Share

Keywords:cryptographic error  encryption system  chip desig 

Weizmann Institute of Science professor and respected cryptographer Adi Shamir warned that increasing sophistication of computer chip design raises the risk that undetected bugs could be used to crack public key encryption systems.

"With the increasing word size and sophisticated optimisations of multiplication units in modern microprocessors, it becomes increasingly likely that they contain some undetected bugs," Shamir said in his note. "This was demonstrated by the accidental discovery of the obscure Pentium division bug in the mid 1990's, and by the recent discovery of a multiplication bug in the Microsoft Excel program."

Shamir added that if some intelligence organisation discovers the existence of such a flaw, or perhaps secretly plants one, then any public key encryption scheme on any computer can be "trivially broken with a single chosen message."

The notion of intelligence agencies influencing chip design to create a secret back door, or simply exploiting one that's already there, may sound like paranoia. But with questions surrounding the origins of a recently discovered flaw in a random number generation algorithm backed by the National Security Agency and National Institute of Standards and Technology coming from respected cryptographers like Bruce Schneier, not to mention the escalating sophistication of cyberattacks in general, make such worries definite concerns.

Shamir relates the "bug attack" to a fault attack method described in 1996, which might involve, for example, using a sudden power spike to exploit an electrical device. The bug attack, however, appears to pose a theoretical risk of greater scope as it might allow millions of PCs to be attacked simultaneously.

While a major chip designer like Intel may have learned from previous design errors, Shamir says that smaller chip design companies may not be so meticulous. And the problem could extend beyond PCs to cell phones, which also may rely on vulnerable silicon.

"As we have demonstrated in this note, even a single (innocent or intentional) bug in any one of these multipliers can lead to a huge security disaster, which can be secretly exploited in an essentially undetectable way by a sophisticated intelligence organisation," Shamir concludes.

Among cryptographers such risks are known. In a post to Google Groups about Shamir's note, Wei Dai, co-creator of the VMAC message authentication code and author of Crypto++, a free C++ class library of cryptographic algorithms, said that there are ways to protect against CPU math errors and that "the RSA implementation in Crypto++ is already protected against this attack."

- Thomas Claburn

Comment on "Sophisticated cryptographic systems ..."
*  You can enter [0] more charecters.
*Verify code:


Visit Asia Webinars to learn about the latest in technology and get practical design tips.


Go to top             Connect on Facebook      Follow us on Twitter      Follow us on Orkut

Back to Top