CryptoDB
Michael Fahr Jr.
Publications
Year
Venue
Title
2023
RWC
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
Abstract
In this work, we recover the private key material of the FrodoKEM key exchange mechanism as submitted to the NIST PQC standardization process. The new mechanism that allows for this is a Rowhammer-assisted poisoning of the FrodoKEM KeyGen process. That is, we induce the FrodoKEM software to output a higher-error PK, (A,B=AS+E), where the error E is modified by Rowhammer.
Then, we perform a decryption failure attack, using a variety of publicly-accessible supercomputing resources running on the order of only 200,000 core-hours. We delicately attenuate the decryption failure rate to ensure that the adversary's attack succeeds practically, but so honest users cannot easily detect the manipulation.
Achieving this public key "poisoning" requires an extreme engineering effort, as FrodoKEM's KeyGen runs on the order of 8 milliseconds. (Prior Rowhammer-assisted attacks against cryptography require as long as 8 hours of persistent access.) In order to handle this real-world timing condition, we require a wide variety of prior and brand new, low-level engineering techniques, including e.g. memory massaging algorithms -- i.e. "Feng Shui" -- and a precisely-targeted performance degradation attack on SHAKE.
Coauthors
- Daniel Apon (1)
- Dana Dachman-Soled (1)
- Thinh Dang (1)
- Michael Fahr Jr. (1)
- Daniel Genkin (1)
- Hunter Kippen (1)
- Andrew Kwong (1)
- Jacob Lichtinger (1)
- Alexander H. Nelson (1)
- Ray Perlner (1)
- Arkady Yerukhimovich (1)