chipwhisperer lite modeling power consumption
play

ChipWhisperer Lite Modeling Power Consumption Every device requires - PowerPoint PPT Presentation

Open source tool for research on hardware attacks Side Channel Power Analysis Glitching Attacks Essentially an oscilloscope attached to a target chip ChipWhisperer Lite Modeling Power Consumption Every device requires power to run


  1. Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially an oscilloscope attached to a target chip ChipWhisperer Lite

  2. Modeling Power Consumption Every device requires power to run (static Dynamic Power – Current required to charge or power) discharge data lines Data moving through the device changes power 00110000 transitioning to 00100011 consumption (dynamic power) • 3 bits changed

  3. Force target device to encrypt many different things Log traces of these different encryptions Analyze these different traces and determine subkeys BREAK ENCRYPTION! Correlation Power Analysis

  4. • Connect to Chipwhisper and set up target board Setting up target device • Connect_cwlite _simpleserial

  5. • Connect to Chipwhisper and set up scope to capture traces Setting up oscilloscope • Setup_cwlite_xmega_aes

  6. CAPTURE TRACES! • Settings on left • Captured traces displayed on the right

  7. • attack_cpa Analyze Traces

  8. Attacking AES Encryption

  9. Results table: first row (in white) is the “result key” from analysis. Note this is the same key as used to generate the traces!

  10. How’d it do that?

  11. How AES works: • AES algorithm XORs the key and data • Uses s-box defined lookup table to replace data • S-box is public and known

  12. Breaking AES Above equation is the relationship between a hypothetical guess for each XOR equation (both key and data to encrypt) compared to the actual change in the trace

  13. • Apply hypothetical guesses to each trace and see what matches • Keep track of which hypothetical has best guess Apply hypothetical guesses • Percentage confidence is the [0,1] number below the results

  14. Results Table (again)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend