AES & RSA Side Channel Attack with ChipWhisperer Cleveland - - PowerPoint PPT Presentation

aes rsa side channel attack
SMART_READER_LITE
LIVE PREVIEW

AES & RSA Side Channel Attack with ChipWhisperer Cleveland - - PowerPoint PPT Presentation

AES & RSA Side Channel Attack with ChipWhisperer Cleveland State University EEC-581 Computer Architecture Andriy Kucher ChipWhisperer Open-source toolchain for hardware security research. Xilinx S6LX9 FPGA XMEGA MCU Target


slide-1
SLIDE 1

AES & RSA Side Channel Attack with ChipWhisperer

Cleveland State University EEC-581 Computer Architecture Andriy Kucher

slide-2
SLIDE 2

ChipWhisperer

  • Open-source toolchain for

hardware security research.

  • Xilinx S6LX9 FPGA
  • XMEGA MCU Target
  • Side channel attack tool
  • Open-source software written in

Python and C

slide-3
SLIDE 3

Breaking AES & RSA

  • AES (Advanced Encryption Standard) – symmetric encryption.
  • Widely used in the world.
  • Side channel attack.
  • Data collection.
  • Key recovery.
  • RSA (Rivest–Shamir–Adleman) – asymmetric encryption.
  • Used every day in browsers as part of HTTPS.
  • Side channel attack.
  • RSA code analysis and finding the leakage.
  • Data collection.
  • Data analysis.
slide-4
SLIDE 4

Breaking AES

  • ChipWhisperer firmware compilation and upload
slide-5
SLIDE 5

Breaking AES

  • Capturing Traces
  • Executing Attack
slide-6
SLIDE 6

Breaking RSA

  • Compiling and uploading target firmware
slide-7
SLIDE 7

Breaking RSA

  • Data collection
  • Key iteration
  • Python API
slide-8
SLIDE 8

Breaking RSA

  • Data analysis
  • Difference plot
  • Automating the process
slide-9
SLIDE 9

Summary

  • Chip Whisperer is low cost, but advanced tool for

hardware security research and testing.

  • Chip Whisperer software package include all of the

tools to recover AES keys.

  • Breaking RSA is more advance process, but not

imposible.

  • Next step is to use tools like SciPy and TensorFlow to

automate the analysis.