Acoustic and power sidechannels are old news, so I didn’t mean to debate the 
very existence of them.

 

What was surprising about this attack was its efficiency despite its low 
frequency nature and that they did it at the *remote* end of the Ethernet cable 
that plugs into the chassis! WiFi is more secure in that department :)

 

Anyway, looking closer, it’s highly dependent on the implementation of the 
ciphers. Symmetric ciphers are ‘too fast’ for this low frequency power attack 
but RSA’s slow exponentiation routines are vulnerable when implemented in a 
certain classical way (seems at least chinese remainder theorem is vulnerable). 
As I understand, OpenSSL’s implementation isn’t vulnerable but GnuPG’s is. So I 
meant to ask this question on this list from the perspective of BC’s own 
implementation and its own vulnerability. Seems that RSA’s partial homomorphic 
nature in the exponentiation department leads to some interesting tricks.

 

The researchers will be presenting details soon, current info at 
http://www.tau.ac.il/~tromer/handsoff/ 

 

Very clever work! 

 

Cheers

Sid

 

From: Paul Cunningham [mailto:pcunning...@wombatsecurity.com] 
Sent: Thursday, August 28, 2014 11:28 AM
To: Edward Ned Harvey (bouncycastle)
Cc: John Anderjaska; Sid Shetye; dev-crypto-csharp@bouncycastle.org
Subject: Re: [dev-crypto-csharp] Side channel vulnerabilities: Power 
consumption and ground potential attacks?

 

I can't comment on specific responses to this thread, but hacking via montoring 
power consumption (SPA and DPA) is a proven technique in the world of 
smartcards. Most smartcard manufacturers have progressed beyond this type of 
vulnerability, but the technique is still valid.

 

Here's a paper I found that talks about it in more detail:

 <http://www.cryptography.com/public/pdf/DPATechInfo.pdf> 
http://www.cryptography.com/public/pdf/DPATechInfo.pdf

 

-pc

 

On Thu, Aug 28, 2014 at 2:02 PM, Edward Ned Harvey (bouncycastle) 
<bouncycas...@nedharvey.com <mailto:bouncycas...@nedharvey.com> > wrote:

> From: John Anderjaska [mailto:john.anderja...@dsainc.com 
> <mailto:john.anderja...@dsainc.com> ]
> Sent: Thursday, August 28, 2014 1:24 PM

>
> In summary I'd say it is a glaring hole in most contemporary
> security solutions.

But the type of information that could be introduced to that medium is what?  
Take it as given, that certain CPU instructions are prone to consume more power 
than other instructions, just because they activate larger areas of the chip, 
with a larger number of bit flips and gate propagations occurring internally, 
so yes, the power consumed "fluctuates according to the computation that is 
being performed by its processor," but does not reveal specifics of the data 
that is being processed.

This is like watching the power consumption of a house painter painting a house 
with his spray gun, and based on the power fluctuations, determining what color 
paint he has loaded in the spray gun.  Yes you can probably tell when he's 
painting, but no you can't determine *what* he's painting.

Yes I believe an observer of the ground signal could determine "I saw a power 
spike between X ms and Y ms, which probably means you did something 
cryptographic or doing some kind of compression or decompression, or graphics 
rendering," but no I don't believe even remotely, that they are extracting 
private keys out of that signal, nor what jpg you viewed, nor what file you 
zip'd up, or what video you converted from H.264 to Mpeg4.  All of these would 
be the *content* of what you were processing at the time.

 

Reply via email to