📜 ⬆️ ⬇️

Extract AES key in no time

Sergey Skorobogatov, who recently discovered a backdoor in a Chinese FPGA chip , produced a successful extraction of the AES key, which is marked as “highly secure” and “practically unbreakable,” on Actel / Microsemi ProASIC3 military grade FPGA in 0.01 seconds.
We used a third-party channel analysis method called Pipeline Emission Analysis (PEA).
This is not a new method in itself, but a significantly improved wave analysis method.
This method, as suggested by Ocelot , is used to attack the implementation of AES on FPGA using crosstalk and interference.
Read more (pdf)

')

Source: https://habr.com/ru/post/145775/


All Articles