Submit Search
Upload
Side channel attacks
•
Download as ODP, PDF
•
4 likes
•
3,338 views
Stefan Fodor
Follow
second presentation on IT Security.
Read less
Read more
News & Politics
Technology
Report
Share
Report
Share
1 of 11
Download now
Recommended
Intrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
Encryption And Decryption
Encryption And Decryption
NA
Key management and distribution
Key management and distribution
Riya Choudhary
Hash Function
Hash Function
ssuserdfb2da
IP Security
IP Security
Keshab Nath
Network forensic
Network forensic
Manjushree Mashal
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
Recommended
Intrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
Encryption And Decryption
Encryption And Decryption
NA
Key management and distribution
Key management and distribution
Riya Choudhary
Hash Function
Hash Function
ssuserdfb2da
IP Security
IP Security
Keshab Nath
Network forensic
Network forensic
Manjushree Mashal
Secure Hash Algorithm
Secure Hash Algorithm
Vishakha Agarwal
SHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
Key management
Key management
Sujata Regoti
Trusted systems
Trusted systems
ahmad abdelhafeez
Digital forensics
Digital forensics
Roberto Ellis
Cryptography and network security
Cryptography and network security
patisa
Session Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
Firewall Design and Implementation
Firewall Design and Implementation
ajeet singh
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
Message Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
12 symmetric key cryptography
12 symmetric key cryptography
drewz lin
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
Cryptography and network security
Cryptography and network security
shraddha mane
Anti forensic
Anti forensic
Milap Oza
Applied Cryptography
Applied Cryptography
Marcelo Martins
Cryptography.ppt
Cryptography.ppt
Uday Meena
Intrusion detection
Intrusion detection
CAS
User authentication
User authentication
CAS
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
More Related Content
What's hot
SHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Ruchi Maurya
Key management
Key management
Sujata Regoti
Trusted systems
Trusted systems
ahmad abdelhafeez
Digital forensics
Digital forensics
Roberto Ellis
Cryptography and network security
Cryptography and network security
patisa
Session Hijacking ppt
Session Hijacking ppt
Harsh Kevadia
Firewall Design and Implementation
Firewall Design and Implementation
ajeet singh
Cryptographic algorithms
Cryptographic algorithms
Anamika Singh
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
Message Authentication Code & HMAC
Message Authentication Code & HMAC
Krishna Gehlot
12 symmetric key cryptography
12 symmetric key cryptography
drewz lin
Intrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
Cryptography and network security
Cryptography and network security
shraddha mane
Anti forensic
Anti forensic
Milap Oza
Applied Cryptography
Applied Cryptography
Marcelo Martins
Cryptography.ppt
Cryptography.ppt
Uday Meena
Intrusion detection
Intrusion detection
CAS
User authentication
User authentication
CAS
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
What's hot
(20)
SHA- Secure hashing algorithm
SHA- Secure hashing algorithm
Key management
Key management
Trusted systems
Trusted systems
Digital forensics
Digital forensics
Cryptography and network security
Cryptography and network security
Session Hijacking ppt
Session Hijacking ppt
Firewall Design and Implementation
Firewall Design and Implementation
Cryptographic algorithms
Cryptographic algorithms
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Message Authentication Code & HMAC
Message Authentication Code & HMAC
12 symmetric key cryptography
12 symmetric key cryptography
Intrusion detection and prevention system
Intrusion detection and prevention system
Cryptography and network security
Cryptography and network security
Anti forensic
Anti forensic
Applied Cryptography
Applied Cryptography
Cryptography.ppt
Cryptography.ppt
Intrusion detection
Intrusion detection
User authentication
User authentication
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RC4&RC5
RC4&RC5
Similar to Side channel attacks
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
01-intro-thompson.ppt
01-intro-thompson.ppt
MarcoAntonioSotoVera
01-intro-thompson.ppt
01-intro-thompson.ppt
ROHITCHHOKER3
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
RamithaDevi
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
rishabhawasthi0365
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
Introduction to security
Introduction to security
Mostafa Elgamala
Dc 11 Brucepotter
Dc 11 Brucepotter
Object-Frontier Software Pvt. Ltd
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
IS Security Presentation
IS Security Presentation
Renjith K P
Similar to Side channel attacks
(13)
01-intro-thompson.ppt
01-intro-thompson.ppt
Computer and Network Security
Computer and Network Security
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Introduction to security
Introduction to security
Dc 11 Brucepotter
Dc 11 Brucepotter
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
IS Security Presentation
IS Security Presentation
More from Stefan Fodor
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
PacMan Rebourn
PacMan Rebourn
Stefan Fodor
Attack of the BEAST
Attack of the BEAST
Stefan Fodor
Risk assesment IT Security project
Risk assesment IT Security project
Stefan Fodor
It Security Project
It Security Project
Stefan Fodor
Squash that Bug!
Squash that Bug!
Stefan Fodor
Protocols for Embedded Node
Protocols for Embedded Node
Stefan Fodor
Qualys Threads
Qualys Threads
Stefan Fodor
2FLogin
2FLogin
Stefan Fodor
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Stefan Fodor
Ruby on Rails 3
Ruby on Rails 3
Stefan Fodor
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
Stefan Fodor
dry_run_exam
dry_run_exam
Stefan Fodor
Facebook
Facebook
Stefan Fodor
Logs
Logs
Stefan Fodor
Reconnaissance software
Reconnaissance software
Stefan Fodor
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Stefan Fodor
Network proj 1.1
Network proj 1.1
Stefan Fodor
Network telnet ssh
Network telnet ssh
Stefan Fodor
More from Stefan Fodor
(20)
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
PacMan Rebourn
PacMan Rebourn
Attack of the BEAST
Attack of the BEAST
Risk assesment IT Security project
Risk assesment IT Security project
It Security Project
It Security Project
Squash that Bug!
Squash that Bug!
Protocols for Embedded Node
Protocols for Embedded Node
Qualys Threads
Qualys Threads
2FLogin
2FLogin
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Ruby on Rails 3
Ruby on Rails 3
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
dry_run_exam
dry_run_exam
Facebook
Facebook
Logs
Logs
Reconnaissance software
Reconnaissance software
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Network proj 1.1
Network proj 1.1
Network telnet ssh
Network telnet ssh
Recently uploaded
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
bhavenpr
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
Fabwelt
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
ankitnayak356677
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
bhavenpr
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
naxymaxyy
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest2
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
Gerald Furnkranz
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
NaveedKhaskheli1
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
FIRST INDIA
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
AbdulGhani778830
Recently uploaded
(10)
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Side channel attacks
1.
Side-Channel Attacks
Stefan FODOR(backb0ne fl00d3r ) 1 day before June 'couse the true 1337 hax0rs don't care about vulnerabilities
2.
3.
Classes of side
channel attack
4.
Examples
5.
Countermeasures
6.
Questions?
7.
8.
9.
10.
11.
Power monitoring attacks
12.
Electromagnetic attacks
13.
Acoustic cryptoanalysis
14.
Differential fault analysis
15.
16.
Apache + mod_SSL
17.
Compared time needed
to decrypting multiple requests
18.
They deduced multiple
1024 bit private-key
19.
20.
Bad : recovered
96% of the text based on audio
21.
Worse : 69%
of all 10 random character password
22.
Worst : works
on ATMs, too
23.
24.
Monitor the electromagnetic
field of the smart-phone performing encryptions
25.
Deduces the encryption
key
26.
27.
Recover the disk
encryption key
28.
… after freezing
the RAM Memory
29.
Released in July
2008, still no decent remedy
30.
31.
Questions?
32.
33.
http://en.wikipedia.org/wiki/Side_channel_attack
34.
http://www.berkeley.edu/news/media/releases/2005/09/14_key.shtml
35.
http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf
36.
http://citp.princeton.edu/memory/
37.
http://www.youtube.com/watch?v=4L8rnYhnLt8
Editor's Notes
Not to be confused with social engineering
* 2 guys from Stanford University * timming usualy performed on smartcard reader * a lot of math and graphs
* Each key sounds different * University of Berkeley * September 2005 * use of statistics: the more likely then tjw
* March 2011 * works from 2 meters away
Cache as RAM
Download now