• 0%
    0 votes
  • Rate this episode
    What did you think?
  • 2
    watchers
  • 3
    plays
  • 17
    collected

Chaos Communication Congress: Season 30

30x46 Extracting keys from FPGAs, OTP Tokens and Door Locks (#5417)

  • 2013-12-28T00:00:00Z
  • 1h
  • English
Speaker: David Side-Channel (and other) Attacks in Practice Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.
Loading...