I can't comment on specific responses to this thread, but hacking via
montoring power consumption (SPA and DPA) is a proven technique in the
world of smartcards. Most smartcard manufacturers have progressed beyond
this type of vulnerability, but the technique is still valid.

Here's a paper I found that talks about it in more detail:
http://www.cryptography.com/public/pdf/DPATechInfo.pdf

-pc


On Thu, Aug 28, 2014 at 2:02 PM, Edward Ned Harvey (bouncycastle) <
bouncycas...@nedharvey.com> wrote:

> > From: John Anderjaska [mailto:john.anderja...@dsainc.com]
> > Sent: Thursday, August 28, 2014 1:24 PM
> >
> > In summary I'd say it is a glaring hole in most contemporary
> > security solutions.
>
> But the type of information that could be introduced to that medium is
> what?  Take it as given, that certain CPU instructions are prone to consume
> more power than other instructions, just because they activate larger areas
> of the chip, with a larger number of bit flips and gate propagations
> occurring internally, so yes, the power consumed "fluctuates according to
> the computation that is being performed by its processor," but does not
> reveal specifics of the data that is being processed.
>
> This is like watching the power consumption of a house painter painting a
> house with his spray gun, and based on the power fluctuations, determining
> what color paint he has loaded in the spray gun.  Yes you can probably tell
> when he's painting, but no you can't determine *what* he's painting.
>
> Yes I believe an observer of the ground signal could determine "I saw a
> power spike between X ms and Y ms, which probably means you did something
> cryptographic or doing some kind of compression or decompression, or
> graphics rendering," but no I don't believe even remotely, that they are
> extracting private keys out of that signal, nor what jpg you viewed, nor
> what file you zip'd up, or what video you converted from H.264 to Mpeg4.
> All of these would be the *content* of what you were processing at the time.
>

Reply via email to