Stealing keys from pcs using a radio: Cheap electromagnetic attacks on windowed exponentiation

114Citations
Citations of this article
103Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present new side-channel attacks on RSA and ElGamal implementations that use sliding-window or fixed-window (m-ary) modular exponentiation. The attacks extract decryption keys using a very low measurement bandwidth (a frequency band of less than 100 kHz around a carrier under 2 MHz) even when attacking multi-GHz CPUs. We demonstrate the attacks’ feasibility by extracting keys from GnuPG (unmodified ElGamal and non-blinded RSA), within seconds, using a nonintrusive measurement of electromagnetic emanations from laptop computers. The measurement equipment is cheap and compact, uses readily-available components (a Software Defined Radio USB dongle or a consumer-grade radio receiver), and can operate untethered while concealed, e. g., inside pita bread. The attacks use a few non-adaptive chosen ciphertexts, crafted so that whenever the decryption routine encounters particular bit patterns in the secret key, intermediate values occur with a special structure that causes observable fluctuations in the electromagnetic field. Through suitable signal processing and cryptanalysis, the bit patterns and eventually the whole secret key are recovered.

Cite

CITATION STYLE

APA

Genkin, D., Pachmanov, L., Pipman, I., & Tromer, E. (2015). Stealing keys from pcs using a radio: Cheap electromagnetic attacks on windowed exponentiation. In Lecture Notes in Computer Science (Vol. 9293, pp. 207–228). Springer Verlag. https://doi.org/10.1007/978-3-662-48324-4_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free