Back to Search Start Over

High-assurance zeroization

Authors :
Santiago Arranz Olmos
Gilles Barthe
Ruben Gonzalez
Benjamin Grégoire
Vincent Laporte
Jean-Christophe Léchenet
Tiago Oliveira
Peter Schwabe
Source :
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2024, Iss 1 (2023)
Publication Year :
2023
Publisher :
Ruhr-Universität Bochum, 2023.

Abstract

In this paper we revisit the problem of erasing sensitive data from memory and registers during return from a cryptographic routine. While the problem and related attacker model is fairly easy to phrase, it turns out to be surprisingly hard to guarantee security in this model when implementing cryptography in common languages such as C/C++ or Rust. We revisit the issues surrounding zeroization and then present a principled solution in the sense that it guarantees that sensitive data is erased and it clearly defines when this happens. We implement our solution as extension to the formally verified Jasmin compiler and extend the correctness proof of the compiler to cover zeroization. We show that the approach seamlessly integrates with state-of-the-art protections against microarchitectural attacks by integrating zeroization into Libjade, a cryptographic library written in Jasmin with systematic protections against timing and Spectre-v1 attacks. We present benchmarks showing that in many cases the overhead of zeroization is barely measurable and that it stays below 2% except for highly optimized symmetric crypto routines on short inputs.

Details

Language :
English
ISSN :
25692925
Volume :
2024
Issue :
1
Database :
Directory of Open Access Journals
Journal :
Transactions on Cryptographic Hardware and Embedded Systems
Publication Type :
Academic Journal
Accession number :
edsdoj.99cd18b8b04597aff7b3c66f244279
Document Type :
article
Full Text :
https://doi.org/10.46586/tches.v2024.i1.375-397