26C3 - 26C3 1.15
26th Chaos Communication Congress
Here be dragons
Speakers | |
---|---|
hunz |
Schedule | |
---|---|
Day | Day 4 - 2009-12-30 |
Room | Saal2 |
Start time | 12:45 |
Duration | 01:00 |
Info | |
ID | 3631 |
Event type | Lecture |
Track | Hacking |
Language used for presentation | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Finding the key in the haystack
A practical guide to Differential Power Analysis
The power consumtion of a microcontroller depends on the actual data being processed. This renders current-based side channel attacks possible: By recording and analyzing the current consumption of a microcontroller, one can recover secret keys. This can be done using Differential Power Analysis (DPA).
While smartcards and other tamper resistant devices usually implement countermeasures to complicate this kind of attack, most consumer hardware isn't DPA-safe. DPA will be explained by example in this talk: A non-hardened, but conventional AES implementation running on a popular AVR microcontroller will be attacked. Real-world power data will be used for analysis.
After explaining the basic idea and the way DPA works, the workflow will be described in detail along with hardware/software requirements and the measurement setup. The measurement process will be explained as well. Prior to analyzing the recorded data, necessary theoretical foundations will be shown without going too much into mathematical details.
Common challenges one might encounter while mounting a DPA-attack will be presented as well as suitable approaches to cope with them. It's the intention of this talk to show that all one needs to conduct a DPA is a half-decent digital storage oscilloscope (DSO) and a bit of electronics & software knowledge.
Links
- Torrent of the video recording for this event in MPEG-4
- Video recording for this event in MPEG-4
- Power Analysis Attacks: Revealing the Secrets of Smart Cards
- M. Aigner, E. Oswald: Power Analysis Tutorial
- P. Kocher, J. Jaffe, B. Jun, "Differential Power Analysis
- RijndaelFurious AVR AES Implementation
- Wikipedia: Advanced Encryption Standard
- Wikipedia: Sum of squares
- Power Analysis sample code
- Wikipedia: Pearson product-moment correlation coefficient