TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Tempest attacks against AES: Stealing keys using minimal equipment [pdf]

126 pointsby Kristine1975almost 8 years ago

13 comments

ckastneralmost 8 years ago
This was the AES implementation this was tested against:<p><i>The trace below shows our signal for one block of AES-256 encryption running on a SmartFusion2 target. We use OpenSSL&#x27;s implementation of AES on the ARM Cortex-M3 core of the SmartFusion2. There are clear, distinct patterns for each stage of processing. We see I&#x2F;O to and from the Cortex-M3, calculations for the key schedule, and the 14 encryption rounds.</i><p>So it was a software implementation.<p>I wonder if and how effective this attack would be against devices with hardware implementations of AES.
评论 #14618916 未加载
评论 #14618026 未加载
2sk21almost 8 years ago
I remember reading about such attacks for the first time in Neal Stephenson&#x27;s book Cryptonomicon under the term &quot;Van Eck Phreaking&quot;. Looks like its gotten a lot easier in recent years!
wizemanalmost 8 years ago
Are there any modern crypto algorithms that are, by design, immune from an attack such as this? Would not having any key-dependent code paths be sufficient to prevent this attack?<p>If it is possible to be immune by design to power analysis, timing and tempest attacks, is there a list of such algorithms somewhere that I can look it up? My google-fu hasn&#x27;t returned anything useful.
评论 #14619271 未加载
评论 #14618644 未加载
评论 #14619044 未加载
评论 #14620260 未加载
评论 #14618742 未加载
评论 #14619505 未加载
评论 #14618631 未加载
mhkoolalmost 8 years ago
An intelligent noise generator that runs as the second hardware thread on the same CPU using should be able to protect the encryption. If the second noise-generation thread is able to randomly stop the encryption thread and do itself some random crypto, it should be able to fool the eavesdropper which will assume that the signals of the noise thread is produced by the encryption thread.<p>One can also think about modifying the implemenation of OpenSSL and others by inserting a lot of noise in the algorithm itself.<p>One can also ask chip designers to modify the circuitry to produce a lot of noise during AES instructions. Or do the opposite in circuitry: use something comparable to active noise cancellation in headphones.
JoachimSchipperalmost 8 years ago
This is research by my close colleagues; I&#x27;m happy to answer any questions.
评论 #14619539 未加载
评论 #14620323 未加载
ishitatsuyukialmost 8 years ago
Well, in many cases AES keys are used one time, and there&#x27;s also forward secrecy that guards it from decryption even if the key leaked.
评论 #14618138 未加载
评论 #14619310 未加载
评论 #14619066 未加载
molticrystalalmost 8 years ago
There was an attempt to do something similar with ps3 <a href="http:&#x2F;&#x2F;www.eurasia.nu&#x2F;modules.php?name=Forums&amp;file=viewtopic&amp;topic=7266&amp;forum=87" rel="nofollow">http:&#x2F;&#x2F;www.eurasia.nu&#x2F;modules.php?name=Forums&amp;file=viewtopic...</a> , progress stopped though.
wdbalmost 8 years ago
Off topic, but I always wondered how defense forces deal with encryption of channel when they collaborate with other forces from different countries. You would somehow be able to add a new participant to the group. Would this require re-issue of keys?
sqldbaalmost 8 years ago
I read it a few times and still don&#x27;t understand how you can get like the 4k of private key data or whatever it is out of a radio signal - and they don&#x27;t even mention keys they&#x27;re talking about the algorithm itself.<p>Totally don&#x27;t get it in the slightest.
评论 #14618729 未加载
joantunealmost 8 years ago
alright, portable faraday cages for everyone!
xczalmost 8 years ago
Can someone ELI5 how this works? Would be much appreciated &lt;3
评论 #14619039 未加载
评论 #14618477 未加载
amqalmost 8 years ago
Guys, stop breaking the world! &#x2F;s
celticninjaalmost 8 years ago
I&#x27;m all for the sharing of information and responsible disclosure etc, but when a company that makes stuff that is supposed to be protected from this sort of attack, then shows how if you dont buy their stuff you are at risk from anyone who can follow their plans and has $200, which they likely couldn&#x27;t do yesterday, it doesnt seem to be as consumer friendly as it could be. more protection racket perhaps,
评论 #14619056 未加载
评论 #14618691 未加载