{"id":25619,"date":"2014-08-22T13:41:17","date_gmt":"2014-08-22T17:41:17","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25619"},"modified":"2014-08-22T13:41:17","modified_gmt":"2014-08-22T17:41:17","slug":"stealing-encryption-keys-through-the-power-of-touch","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/stealing-encryption-keys-through-the-power-of-touch.php","title":{"rendered":"Stealing encryption keys through the power of touch"},"content":{"rendered":"<p><p>    Researchers from Tel Aviv University have demonstrated an    attack against the GnuPG encryption software that enables them    to retrieve decryption keys by touching exposed metal parts of    laptop computers.  <\/p>\n<p>    There are several ways of attacking encryption systems. At one    end of the spectrum, there are flaws and weaknesses in the    algorithms themselves that make it easier than it should be to    figure out the key to decrypt something. At the other end,    there are flaws and weaknesses in human flesh and bones that    make it easier than it should be to force someone to offer up    the key to decrypt something.  <\/p>\n<p>    In the middle are a range of attacks that don't depend on flaws    on the encryption algorithms but rather in the way    they've been implemented. Encryption systems, both    software and hardware, can leak information about the keys    being used in all sorts of indirect ways, such as the    performance of the system's cache, or the time taken to perform    encryption and decryption operations. Attacks using these    indirect information leaks are known collectively as side    channel attacks.  <\/p>\n<p>    This research is a side-channel attack. The metal parts of a    laptop, such as the shielding around USB ports, and heatsink    fins, are notionally all at a common ground level. However,    this level undergoes tiny fluctuations due to the electric    fields within the laptop. These variations can be measured, and    this can be used to leak information about encryption keys.  <\/p>\n<p>    The measurements can be done by directly attaching a digitizer    to a metal part of the laptop, but they don't have to be this    obvious. The researchers showed that they could retrieve    information with connections at the far end of    shielded USB, VGA, and Ethernet connections. They also used    human touch: a person in contact with metal parts of the laptop    can in turn be connected to a digitizer, and the voltage    fluctuations can be measured.  <\/p>\n<p>    The researchers note that this works better in hot weather, due    to the lower resistance of sweaty fingers.  <\/p>\n<p>    While the information retrieval was better when used with    high-end lab equipment, the researchers also experimented with    using a smartphone connected to Ethernet shielding via its    headphone port, and found that this was sufficient to perform    some attacks.  <\/p>\n<p>    The major importance source of the voltage variations is the    processor. The simplest thing to detect is probably whether the    processor is active or sleeping, with the researchers saying    that on almost all machines, the difference between an active    processor and a processor suspended with the \"HLT\" instruction    could be detected. On many machines, finer grained information    was visible. The research recorded the fluctuations with a    sample rate of between a few tens of kilohertz, and a few    megahertz. These sample rates are far lower than the several    gigahertz that processors operate, and so these measurements    can't give insight into individual instructionsbut this wasn't    actually necessary.  <\/p>\n<p>    During encryption and decryption operations, the processor has    to perform certain long-running operations (for example,        exponentiation of various large numbers), and these    operations caused a consistent, characteristic set of voltage    fluctuations. When sampling the voltages at a rate of a few    MHz, keys for the RSA and ElGamal encryption algorithms could    be extracted in a few seconds.  <\/p>\n<p>    This attack required a single piece of encrypted data to be    decrypted a few times.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/security\/2014\/08\/stealing-encryption-keys-through-the-power-of-touch\" title=\"Stealing encryption keys through the power of touch\">Stealing encryption keys through the power of touch<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Researchers from Tel Aviv University have demonstrated an attack against the GnuPG encryption software that enables them to retrieve decryption keys by touching exposed metal parts of laptop computers. There are several ways of attacking encryption systems<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25619","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25619"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25619"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25619\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}