4.1 Article

Get your hands off my laptop: physical side-channel key-extraction attacks on PCs

期刊

JOURNAL OF CRYPTOGRAPHIC ENGINEERING
卷 5, 期 2, 页码 95-112

出版社

SPRINGER HEIDELBERG
DOI: 10.1007/s13389-015-0100-7

关键词

Side channel attack; Power analysis; RSA; ElGamal

资金

  1. Check Point Institute for Information Security
  2. European Union's Tenth Framework Programme (FP10) [259426]
  3. Leona M. & Harry B. Helmsley Charitable Trust
  4. Israeli Ministry of Science and Technology
  5. Israeli Centers of Research Excellence I-CORE program [4/11]
  6. NATO's Public Diplomacy Division in the Framework of Science for Peace

向作者/读者索取更多资源

We demonstrate physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels, based on the observation that the ground electric potential, in many computers, fluctuates in a computation-dependent way. An attacker can measure this signal by touching exposed metal on the computer's chassis with a plain wire, or even with a bare hand. The signal can also be measured on the ground shield at the remote end of Ether-net, USB and display cables. Through suitable cryptanalysis and signal processing, we have extracted 4096-bit RSA keys and 3072-bit ElGamal keys from laptops, via each of these channels, as well as via power analysis and electromagnetic probing. Despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using Medium Frequency (MF) signals (around 2 MHz), or one hour using Low Frequency (LF) signals (up to 40 kHz).

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.1
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据