aes rsa side channel attack
play

AES & RSA Side Channel Attack with ChipWhisperer Cleveland - PowerPoint PPT Presentation

AES & RSA Side Channel Attack with ChipWhisperer Cleveland State University EEC-581 Computer Architecture Andriy Kucher ChipWhisperer Open-source toolchain for hardware security research. Xilinx S6LX9 FPGA XMEGA MCU Target


  1. AES & RSA Side Channel Attack with ChipWhisperer Cleveland State University EEC-581 Computer Architecture Andriy Kucher

  2. ChipWhisperer • Open-source toolchain for hardware security research. • Xilinx S6LX9 FPGA • XMEGA MCU Target • Side channel attack tool • Open-source software written in Python and C

  3. Breaking AES & RSA • AES (Advanced Encryption Standard) – symmetric encryption. • Widely used in the world. • Side channel attack. • Data collection. • Key recovery. • RSA (Rivest – Shamir – Adleman) – asymmetric encryption. • Used every day in browsers as part of HTTPS. • Side channel attack. • RSA code analysis and finding the leakage. • Data collection. • Data analysis.

  4. Breaking AES • ChipWhisperer firmware compilation and upload

  5. Breaking AES • Capturing Traces • Executing Attack

  6. Breaking RSA • Compiling and uploading target firmware

  7. Breaking RSA • Data collection • Key iteration • Python API

  8. Breaking RSA • Data analysis • Difference plot • Automating the process

  9. Summary • Chip Whisperer is low cost, but advanced tool for hardware security research and testing. • Chip Whisperer software package include all of the tools to recover AES keys. • Breaking RSA is more advance process, but not imposible. • Next step is to use tools like SciPy and TensorFlow to automate the analysis.

Recommend


More recommend