Get your hands off my laptop: physical side-channel key-extraction attacks on PCs

被引:58
作者
Genkin, Daniel [1 ,2 ]
Pipman, Itamar [2 ]
Tromer, Eran [2 ]
机构
[1] Technion, Haifa, Israel
[2] Tel Aviv Univ, Tel Aviv, Israel
关键词
Side channel attack; Power analysis; RSA; ElGamal;
D O I
10.1007/s13389-015-0100-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels, based on the observation that the "ground" electric potential, in many computers, fluctuates in a computation-dependent way. An attacker can measure this signal by touching exposed metal on the computer's chassis with a plain wire, or even with a bare hand. The signal can also be measured on the ground shield at the remote end of Ether-net, USB and display cables. Through suitable cryptanalysis and signal processing, we have extracted 4096-bit RSA keys and 3072-bit ElGamal keys from laptops, via each of these channels, as well as via power analysis and electromagnetic probing. Despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using Medium Frequency (MF) signals (around 2 MHz), or one hour using Low Frequency (LF) signals (up to 40 kHz).
引用
收藏
页码:95 / 112
页数:18
相关论文
共 37 条
[1]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]  
Anderson R.J., 2008, SECURITY ENG GUIDE B
[3]  
BARRETT P, 1987, LECT NOTES COMPUT SC, V263, P311
[4]  
Brumley BB, 2011, LECT NOTES COMPUT SC, V6879, P355, DOI 10.1007/978-3-642-23822-2_20
[5]   Remote timing attacks are practical [J].
Brumley, D ;
Boneh, D .
COMPUTER NETWORKS, 2005, 48 (05) :701-716
[6]  
Callas J., 2007, OPENPGP MESSAGE FORM
[7]  
Clark Shane S., 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P700, DOI 10.1007/978-3-642-40203-6_39
[8]   Small solutions to polynomial equations, and low exponent RSA vulnerabilities [J].
Coppersmith, D .
JOURNAL OF CRYPTOLOGY, 1997, 10 (04) :233-260
[9]  
Courrege JC, 2010, LECT NOTES COMPUT SC, V6035, P65, DOI 10.1007/978-3-642-12510-2_6
[10]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472