Feeds

Military chip crypto cracked with power-analysis probe

Akin to listening to safe tumblers, but with 'leccy

Build a business case: developing custom apps

German computer scientists have taken advantage of the powerful number-crunching abilities of graphics chips to demonstrate a practical attack on the encryption scheme in programmable chips.

Field Programmable Gate Array (FPGA) chips of the type used in embedded systems belonging to the military and the aerospace industry are vulnerable to attacks based on analysing power usage during the power up sequence of the chip. The side-channel attack against the bitstream encryption mechanism used by Virtex 4 and Virtex 5 chips from Xilinx allowed researchers from the Ruhr University to extract a key used to decrypt configuration instruction files. The technique uncovered secret keys by analysing fluctuations in power consumption during the decryption process.

Only one power up sequence needs to be monitored. The subsequent number crunching took up to nine hours, in the case of the more advanced Virtex 5 chip, or six hours in the case of the earlier Virtex 4.

The approach is akin to listening to the clicks coming from the tumblers of a safe to work out a combination, but using variations in power consumption rather than sound.

Identical decryption keys are normally used in all FPGAs in a mass-produced product, so the attack opens the way up towards the creation of counterfeit kit that would be difficult to tell apart from the real thing, or even the surreptitious introduction of hardware Trojans, the researchers warn. It might be possible to introduce revised instructions that compromised devices would accept as genuine because they had been signed with the correct digital key.

Access to the key allows cloning and manipulating a design, which has been encrypted to protect the intellectual property and to prevent fraud. As a consequence, the target product faces serious threats like IP theft and more advanced attacks such as reverse engineering or the introduction of hardware Trojans.

To the best of our knowledge, this is the first successful attack against the bitstream encryption of Xilinx Virtex 4 and Virtex 5 reported in the open literature.

The attack could be carried out with off-the-shelf hardware at moderate effort.

Countermeasures against such side-channel attacks have already been applied in some high-security devices, such as smartcards for banking or pay-TV applications, but not previously though necessary for complex semiconductor circuits, such as FPGAs cracked by the German team.

More details on the research by Amir Moradi, Markus Kasper and Christof Paa from the Horst Gortz Institute for IT-Security at Ruhr University can be found in a paper, On the Portability of Side-Channel Attacks, here. ®

The essential guide to IT transformation

More from The Register

next story
Rupert Murdoch says Google is worse than the NSA
Mr Burns vs. The Chocolate Factory, round three!
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Germany 'accidentally' snooped on John Kerry and Hillary Clinton
Dragnet surveillance picks up EVERYTHING, USA, m'kay?
Know what Ferguson city needs right now? It's not Anonymous doxing random people
U-turn on vow to identify killer cop after fingering wrong bloke
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
Think crypto hides you from spooks on Facebook? THINK AGAIN
Traffic fingerprints reveal all, say boffins
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.