Extract AES key in no time
Sergei Skorobogatov, who recently discovered a backdoor in a Chinese FPGA chip , successfully extracted an AES key, which is marked as “highly secure” and “virtually unbreakable,” on a Actel / Microsemi ProASIC3 military-grade FPGA in 0.01 second.
A third-party channel analysis method called Pipeline Emission Analysis (PEA) was used.
This is not a new method in itself, but a significantly improved method of wave analysis.
This method, as Ocelot suggests , is used to attack the implementation of AES on the FPGA, using interference and interference.
Details (pdf)
A third-party channel analysis method called Pipeline Emission Analysis (PEA) was used.
This is not a new method in itself, but a significantly improved method of wave analysis.
This method, as Ocelot suggests , is used to attack the implementation of AES on the FPGA, using interference and interference.
Details (pdf)