Extract AES key in no time

    Sergei Skorobogatov, who recently discovered a backdoor in a Chinese FPGA chip , successfully extracted an AES key, which is marked as “highly secure” and “virtually unbreakable,” on a Actel / Microsemi ProASIC3 military-grade FPGA in 0.01 second.
    A third-party channel analysis method called Pipeline Emission Analysis (PEA) was used.
    This is not a new method in itself, but a significantly improved method of wave analysis.
    This method, as Ocelot suggests , is used to attack the implementation of AES on the FPGA, using interference and interference.
    Details (pdf)

    Also popular now: