Simple photonic emission analysis of AES

被引:31
作者
Schloesser, Alexander [1 ]
Nedospasov, Dmitry [2 ]
Kramer, Juliane [2 ]
Orlic, Susanna [1 ]
Seifert, Jean-Pierre [2 ]
机构
[1] Tech Univ Berlin, Inst Opt & Atom Phys, Opt Technol, Berlin, Germany
[2] Tech Univ Berlin, Dept Software Engn & Theoret Comp Sci, Secur Telecommun, Berlin, Germany
关键词
Photonic side channel; Side channel analysis; Emission analysis; Optical; Temporal and spatial analysis; AES; Full key recovery;
D O I
10.1007/s13389-013-0053-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work presents a novel low-cost optoelectronic setup for time-and spatially resolved analysis of photonic emissions and a corresponding methodology, Simple Photonic Emission Analysis (SPEA). Observing the backside of ICs, the system captures extremly weak photo-emissions from switching transistors and relates them to code running in the chip. SPEA utilizes both spatial and temporal information about these emissions to perform side channel analysis of ICs. We successfully performed SPEA of a proof-of-concept AES implementation and were able to recover the full AES secret key by monitoring accesses to the S-Box. This attack directly exploits the side channel leakage of a single transistor and requires no additional data processing. The system costs and the necessary time for an attack are comparable to power analysis techniques. The presented approach significantly reduces the amount of effort required to perform attacks based on photonic emission analysis and allows AES key recovery in a relevant amount of time. We present practical results for the AVR ATMega328P and the AVR XMega128A1.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 27 条
[1]  
[Anonymous], 2012, PHOTON DA AES IMPLEM
[2]   Time Resolved Imaging: From logical states to events, a new and efficient pattern matching method for VLSI analysis [J].
Bascoul, G. ;
Perdu, P. ;
Benigni, A. ;
Dudit, S. ;
Celi, G. ;
Lewis, D. .
MICROELECTRONICS RELIABILITY, 2011, 51 (9-11) :1640-1645
[3]  
Bernstein D.J., 2004, CACHE TIMING ATTACKS
[4]   PHOTON EMISSION FROM AVALANCHE BREAKDOWN IN SILICON [J].
CHYNOWETH, AG ;
MCKAY, KG .
PHYSICAL REVIEW, 1956, 102 (02) :369-376
[5]  
Clavier C., 2000, LECT NOTES COMPUTER, P13, DOI DOI 10.1007/3-540-44499-8-20
[6]   When Failure Analysis Meets Side-Channel Attacks [J].
Di-Battista, Jerome ;
Courrege, Jean-Christophe ;
Rouzeyre, Bruno ;
Torres, Lionel ;
Perdu, Philippe .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 :188-+
[7]   Application of time resolved emission techniques within the failure analysis flow [J].
Egger, Peter ;
Griitzner, Markus ;
Burmer, Christian ;
Dudkiewicz, Fabien .
MICROELECTRONICS RELIABILITY, 2007, 47 (9-11) :1545-1549
[8]   When AES blinks:: introducing optical side channel [J].
Ferrigno, J. ;
Hlavac, M. .
IET INFORMATION SECURITY, 2008, 2 (03) :94-98
[9]   Cache Games - Bringing Access-Based Cache Attacks on AES to Practice [J].
Gullasch, David ;
Bangerter, Endre ;
Krenn, Stephan .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :490-505
[10]  
Heyszl J, 2012, LECT NOTES COMPUT SC, V7178, P231, DOI 10.1007/978-3-642-27954-6_15