AES & RSA Side Channel Attack with ChipWhisperer · 2019-08-28 · onots onto' 000"...

Preview:

Citation preview

AES & RSASide Channel Attack

with ChipWhisperer

Cleveland State University

EEC-581

Computer Architecture

Andriy Kucher

ChipWhisperer

• Open-source toolchain for hardware security research.

• Xilinx S6LX9 FPGA

• XMEGA MCU Target

• Side channel attack tool

• Open-source software written in Python and C

Breaking AES & RSA

• AES (Advanced Encryption Standard) – symmetric encryption.• Widely used in the world.• Side channel attack.• Data collection.• Key recovery.

• RSA (Rivest–Shamir–Adleman) – asymmetric encryption.• Used every day in browsers as part of HTTPS.• Side channel attack.• RSA code analysis and finding the leakage.• Data collection.• Data analysis.

Breaking AES

• ChipWhisperer firmware compilation and upload

Breaking AES

• Capturing Traces

• Executing Attack

Breaking RSA

• Compiling and uploading target firmware

Breaking RSA

• Data collection

• Key iteration

• Python API

Breaking RSA

• Data analysis

• Difference plot

• Automating the process

Summary

•Chip Whisperer is low cost, but advanced tool for hardware security research and testing.•Chip Whisperer software package include all of the

tools to recover AES keys.•Breaking RSA is more advance process, but not

imposible. •Next step is to use tools like SciPy and TensorFlow to

automate the analysis.

Recommended