University of Cambridge > Talks.cam > Isaac Newton Institute Seminar Series > Lessons Learned from Four Years of Implementation Attacks against Real-World Targets

Lessons Learned from Four Years of Implementation Attacks against Real-World Targets

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Mustapha Amrani.

Semantics and Syntax: A Legacy of Alan Turing

Over the last few years we were able to break various real-world security systems using various flavours of physical attacks. About three years ago we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. Even though the attack seems almost straightforward in hindsight, there where many practical and theoretical problems to overcome. More recently we were able to break certain types of the DES Fire contactless smart card, which are widely used, e.g., for payment application. We also completely broke the bit stream encryption used in Xilinx FPG As. In all both cases we were able to recover the keys for either 3DES or AES using power analysis attacks. In contrast to KeeLoq, both 3DES and AES are considered very secure from a classical cryptanalyitical point of view. Interesingly, the real-world implications of these key-extraction attacks are highly dependend on the system design (and not on the cipher used). In addition to summarizing the above mentioned work, I will try to draw some meaningful conclusions. This includes the often considerable practial hurdles an attacker has to overcome and the important role that system design plays.

This talk is part of the Isaac Newton Institute Seminar Series series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

© 2006-2019 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity