AES & RSA Side Channel Attack with ChipWhisperer Cleveland State University EEC-581 Computer Architecture Andriy Kucher
ChipWhisperer • Open-source toolchain for hardware security research. • Xilinx S6LX9 FPGA • XMEGA MCU Target • Side channel attack tool • Open-source software written in Python and C
Breaking AES & RSA • AES (Advanced Encryption Standard) – symmetric encryption. • Widely used in the world. • Side channel attack. • Data collection. • Key recovery. • RSA (Rivest – Shamir – Adleman) – asymmetric encryption. • Used every day in browsers as part of HTTPS. • Side channel attack. • RSA code analysis and finding the leakage. • Data collection. • Data analysis.
Breaking AES • ChipWhisperer firmware compilation and upload
Breaking AES • Capturing Traces • Executing Attack
Breaking RSA • Compiling and uploading target firmware
Breaking RSA • Data collection • Key iteration • Python API
Breaking RSA • Data analysis • Difference plot • Automating the process
Summary • Chip Whisperer is low cost, but advanced tool for hardware security research and testing. • Chip Whisperer software package include all of the tools to recover AES keys. • Breaking RSA is more advance process, but not imposible. • Next step is to use tools like SciPy and TensorFlow to automate the analysis.
Recommend
More recommend