Chaos Communication Congress
Chaos Communication Congress
Extracting keys from FPGAs, OTP Tokens and Door Locks (#5417) (30x46)
: 28, 2013
Speaker: David
Side-Channel (and other) Attacks in Practice
Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.