Submit Search
Upload
Side channel attacks
•
Download as ODP, PDF
•
4 likes
•
3,354 views
Stefan Fodor
Follow
second presentation on IT Security.
Read less
Read more
News & Politics
Technology
Report
Share
Report
Share
1 of 11
Download now
Recommended
Ch03
Ch03
Joe Christensen
Message Authentication
Message Authentication
chauhankapil
Hash Function
Hash Function
Siddharth Srivastava
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
Wireless Attacks
Wireless Attacks
primeteacher32
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
Hash Function.pdf
Hash Function.pdf
Santosh Gupta
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
Recommended
Ch03
Ch03
Joe Christensen
Message Authentication
Message Authentication
chauhankapil
Hash Function
Hash Function
Siddharth Srivastava
Network Security and Cryptography
Network Security and Cryptography
Adam Reagan
Wireless Attacks
Wireless Attacks
primeteacher32
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
Hash Function.pdf
Hash Function.pdf
Santosh Gupta
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
CAS
Hash Function
Hash Function
ssuserdfb2da
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Security Threats at OSI layers
Security Threats at OSI layers
Department of Computer Science
Unit 1
Unit 1
Trupti Kodinariya
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
SSL & TLS Architecture short
SSL & TLS Architecture short
Avirot Mitamura
Aes
Aes
Muhammad Asif
block ciphers
block ciphers
Asad Ali
WEP/WPA attacks
WEP/WPA attacks
Huda Seyam
Feistel cipher
Feistel cipher
MDKAWSARAHMEDSAGAR
Software security
Software security
Roman Oliynykov
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
Jyothishmathi Institute of Technology and Science Karimnagar
Hash function
Hash function
Salman Memon
Lightweight cryptography
Lightweight cryptography
Shivam Singh
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
More Related Content
What's hot
Hash Function
Hash Function
ssuserdfb2da
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Security Threats at OSI layers
Security Threats at OSI layers
Department of Computer Science
Unit 1
Unit 1
Trupti Kodinariya
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
SSL & TLS Architecture short
SSL & TLS Architecture short
Avirot Mitamura
Aes
Aes
Muhammad Asif
block ciphers
block ciphers
Asad Ali
WEP/WPA attacks
WEP/WPA attacks
Huda Seyam
Feistel cipher
Feistel cipher
MDKAWSARAHMEDSAGAR
Software security
Software security
Roman Oliynykov
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
Jyothishmathi Institute of Technology and Science Karimnagar
Hash function
Hash function
Salman Memon
Lightweight cryptography
Lightweight cryptography
Shivam Singh
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Prince Rachit
Block cipher modes of operation
Block cipher modes of operation
harshit chavda
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
Faisal Shahzad Khan
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
sarhadisoftengg
What's hot
(20)
Hash Function
Hash Function
Network security & cryptography full notes
Network security & cryptography full notes
Security Threats at OSI layers
Security Threats at OSI layers
Unit 1
Unit 1
Secure Hash Algorithm
Secure Hash Algorithm
symmetric key encryption algorithms
symmetric key encryption algorithms
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
SSL & TLS Architecture short
SSL & TLS Architecture short
Aes
Aes
block ciphers
block ciphers
WEP/WPA attacks
WEP/WPA attacks
Feistel cipher
Feistel cipher
Software security
Software security
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
Hash function
Hash function
Lightweight cryptography
Lightweight cryptography
AES-Advanced Encryption Standard
AES-Advanced Encryption Standard
Block cipher modes of operation
Block cipher modes of operation
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
Similar to Side channel attacks
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
01-intro-thompson.ppt
01-intro-thompson.ppt
MarcoAntonioSotoVera
01-intro-thompson.ppt
01-intro-thompson.ppt
ROHITCHHOKER3
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
RamithaDevi
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
rishabhawasthi0365
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
Introduction to security
Introduction to security
Mostafa Elgamala
Dc 11 Brucepotter
Dc 11 Brucepotter
Object-Frontier Software Pvt. Ltd
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
IS Security Presentation
IS Security Presentation
Renjith K P
Similar to Side channel attacks
(13)
01-intro-thompson.ppt
01-intro-thompson.ppt
Computer and Network Security
Computer and Network Security
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Introduction to security
Introduction to security
Dc 11 Brucepotter
Dc 11 Brucepotter
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
IS Security Presentation
IS Security Presentation
More from Stefan Fodor
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
PacMan Rebourn
PacMan Rebourn
Stefan Fodor
Attack of the BEAST
Attack of the BEAST
Stefan Fodor
Risk assesment IT Security project
Risk assesment IT Security project
Stefan Fodor
It Security Project
It Security Project
Stefan Fodor
Squash that Bug!
Squash that Bug!
Stefan Fodor
Protocols for Embedded Node
Protocols for Embedded Node
Stefan Fodor
Qualys Threads
Qualys Threads
Stefan Fodor
2FLogin
2FLogin
Stefan Fodor
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Stefan Fodor
Ruby on Rails 3
Ruby on Rails 3
Stefan Fodor
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
Stefan Fodor
dry_run_exam
dry_run_exam
Stefan Fodor
Facebook
Facebook
Stefan Fodor
Logs
Logs
Stefan Fodor
Reconnaissance software
Reconnaissance software
Stefan Fodor
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Stefan Fodor
Network proj 1.1
Network proj 1.1
Stefan Fodor
Network telnet ssh
Network telnet ssh
Stefan Fodor
More from Stefan Fodor
(20)
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
PacMan Rebourn
PacMan Rebourn
Attack of the BEAST
Attack of the BEAST
Risk assesment IT Security project
Risk assesment IT Security project
It Security Project
It Security Project
Squash that Bug!
Squash that Bug!
Protocols for Embedded Node
Protocols for Embedded Node
Qualys Threads
Qualys Threads
2FLogin
2FLogin
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Ruby on Rails 3
Ruby on Rails 3
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
dry_run_exam
dry_run_exam
Facebook
Facebook
Logs
Logs
Reconnaissance software
Reconnaissance software
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Network proj 1.1
Network proj 1.1
Network telnet ssh
Network telnet ssh
Recently uploaded
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
Andy (Avraham) Blumenthal
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
bhavenpr
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
lambardar420420
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
ssuser5750e1
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
srinuseo15
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
RahatulAshafeen
China's soft power in 21st century .pptx
China's soft power in 21st century .pptx
YasinAhmad20
The political system of the united kingdom
The political system of the united kingdom
lunadelior
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
FIRST INDIA
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
FIRST INDIA
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
anjanibaddipudi1
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
bhavenpr
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
IT Industry
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Insiger
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
FIRST INDIA
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
VoterMood
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
bhavenpr
Recently uploaded
(20)
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
China's soft power in 21st century .pptx
China's soft power in 21st century .pptx
The political system of the united kingdom
The political system of the united kingdom
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Side channel attacks
1.
Side-Channel Attacks
Stefan FODOR(backb0ne fl00d3r ) 1 day before June 'couse the true 1337 hax0rs don't care about vulnerabilities
2.
3.
Classes of side
channel attack
4.
Examples
5.
Countermeasures
6.
Questions?
7.
8.
9.
10.
11.
Power monitoring attacks
12.
Electromagnetic attacks
13.
Acoustic cryptoanalysis
14.
Differential fault analysis
15.
16.
Apache + mod_SSL
17.
Compared time needed
to decrypting multiple requests
18.
They deduced multiple
1024 bit private-key
19.
20.
Bad : recovered
96% of the text based on audio
21.
Worse : 69%
of all 10 random character password
22.
Worst : works
on ATMs, too
23.
24.
Monitor the electromagnetic
field of the smart-phone performing encryptions
25.
Deduces the encryption
key
26.
27.
Recover the disk
encryption key
28.
… after freezing
the RAM Memory
29.
Released in July
2008, still no decent remedy
30.
31.
Questions?
32.
33.
http://en.wikipedia.org/wiki/Side_channel_attack
34.
http://www.berkeley.edu/news/media/releases/2005/09/14_key.shtml
35.
http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf
36.
http://citp.princeton.edu/memory/
37.
http://www.youtube.com/watch?v=4L8rnYhnLt8
Editor's Notes
Not to be confused with social engineering
* 2 guys from Stanford University * timming usualy performed on smartcard reader * a lot of math and graphs
* Each key sounds different * University of Berkeley * September 2005 * use of statistics: the more likely then tjw
* March 2011 * works from 2 meters away
Cache as RAM
Download now