Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation

被引:90
作者
Genkin, Daniel [1 ,2 ]
Pachmanov, Lev [2 ]
Pipman, Itamar [2 ]
Tromer, Eran [2 ]
机构
[1] Technion, Haifa, Israel
[2] Tel Aviv Univ, Tel Aviv, Israel
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015 | 2015年 / 9293卷
关键词
Side channel; Electromagnetic analysis; RSA; ElGamal;
D O I
10.1007/978-3-662-48324-4_11
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present new side-channel attacks on RSA and ElGamal implementations that use sliding-window or fixed-window (m-ary) modular exponentiation. The attacks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100 kHz around a carrier under 2 MHz) even when attacking multi-GHz CPUs. We demonstrate the attacks' feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds, using a nonintrusive measurement of electromagnetic emanations from laptop computers. The measurement equipment is cheap and compact, uses readily-available components (a Software Defined Radio USB dongle or a consumer-grade radio receiver), and can operate untethered while concealed, e.g., inside pita bread. The attacks use a few non-adaptive chosen ciphertexts, crafted so that whenever the decryption routine encounters particular bit patterns in the secret key, intermediate values occur with a special structure that causes observable fluctuations in the electromagnetic field. Through suitable signal processing and cryptanalysis, the bit patterns and eventually the whole secret key are recovered.
引用
收藏
页码:207 / 228
页数:22
相关论文
共 33 条
[1]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]  
Anderson R. J., 2008, Security Engineering: A Guide to Building Dependable Distributed Systems
[3]  
[Anonymous], 2012, WORKSH CRYPT HARDW E
[4]  
[Anonymous], 2006, RUMP SESSION
[5]  
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[6]   Remote timing attacks are practical [J].
Brumley, D ;
Boneh, D .
COMPUTER NETWORKS, 2005, 48 (05) :701-716
[7]  
Chari S., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P398
[8]  
Clark Shane S., 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P700, DOI 10.1007/978-3-642-40203-6_39
[9]  
Clavier C., 2001, LECT NOTES COMPUTER, V2162, P300
[10]  
Clavier C, 2010, LECT NOTES COMPUT SC, V6476, P46, DOI 10.1007/978-3-642-17650-0_5