14
ChipWhisperer Lite Open source tool for research on hardware attacks Side Channel Power Analysis Glitching Attacks Essentially an oscilloscope attached to a target chip

ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

ChipWhisperer Lite

Open source tool for research on hardware attacks

• Side Channel Power Analysis

• Glitching Attacks

Essentially an oscilloscope attached to a target chip

Page 2: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Modeling Power Consumption

Every device requires power to run (static power)

Data moving through the device changes power consumption (dynamic power)

Dynamic Power – Current required to charge or discharge data lines

00110000 transitioning to 00100011

• 3 bits changed

Page 3: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Correlation Power Analysis

Force target device to encrypt many different things

Log traces of these different encryptions

Analyze these different traces and determine subkeys

BREAK ENCRYPTION!

Page 4: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Setting up target device

• Connect to Chipwhisper and set up target board

• Connect_cwlite _simpleserial

Page 5: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Setting up oscilloscope

• Connect to Chipwhisper and set up scope to capture traces

• Setup_cwlite_xmega_aes

Page 6: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

CAPTURE TRACES!

• Settings on left

• Captured traces displayed on the right

Page 7: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Analyze Traces• attack_cpa

Page 8: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Attacking AES Encryption

Page 9: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Results table: first row (in white) is the “result key” from analysis.

Note this is the same key as used to generate the traces!

Page 10: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

How’d it do that?

Page 11: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

How AES works:• AES algorithm XORs the key and data

• Uses s-box defined lookup table to replace data

• S-box is public

and known

Page 12: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Breaking AES

Above equation is the relationship between a hypothetical guess for each XOR equation (both key and data to encrypt)

compared to the actual change in the trace

Page 13: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Apply hypothetical guesses

• Apply hypothetical guesses to each trace and see what matches

• Keep track of which hypothetical has best guess

• Percentage confidence is the [0,1] number below the results

Page 14: ChipWhisperer Lite - Cleveland State University · ChipWhisperer Lite Open source tool for research on hardware attacks • Side Channel Power Analysis • Glitching Attacks Essentially

Results Table (again)