aes & rsa side channel attack with chipwhisperer · 2019-08-28 · onots onto' 000"...
TRANSCRIPT
AES & RSASide Channel Attack
with ChipWhisperer
Cleveland State University
EEC-581
Computer Architecture
Andriy Kucher
ChipWhisperer
• Open-source toolchain for hardware security research.
• Xilinx S6LX9 FPGA
• XMEGA MCU Target
• Side channel attack tool
• Open-source software written in Python and C
Breaking AES & RSA
• AES (Advanced Encryption Standard) – symmetric encryption.• Widely used in the world.• Side channel attack.• Data collection.• Key recovery.
• RSA (Rivest–Shamir–Adleman) – asymmetric encryption.• Used every day in browsers as part of HTTPS.• Side channel attack.• RSA code analysis and finding the leakage.• Data collection.• Data analysis.
Breaking AES
• ChipWhisperer firmware compilation and upload
Breaking AES
• Capturing Traces
• Executing Attack
Breaking RSA
• Compiling and uploading target firmware
Breaking RSA
• Data collection
• Key iteration
• Python API
Breaking RSA
• Data analysis
• Difference plot
• Automating the process
Summary
•Chip Whisperer is low cost, but advanced tool for hardware security research and testing.•Chip Whisperer software package include all of the
tools to recover AES keys.•Breaking RSA is more advance process, but not
imposible. •Next step is to use tools like SciPy and TensorFlow to
automate the analysis.