Sergey Skorobogatov, who recently
discovered a backdoor in a Chinese FPGA chip , produced a successful extraction of the AES key, which is marked as “highly secure” and “practically unbreakable,” on Actel / Microsemi ProASIC3 military grade FPGA in 0.01 seconds.
We used a third-party channel analysis method called Pipeline Emission Analysis (PEA).
This is not a new method in itself, but a significantly improved wave analysis method.
This method, as suggested by
Ocelot , is used to attack the implementation of AES on FPGA using crosstalk and interference.
Read more (pdf)