Главная
Study mode:
on
1
Introduction
2
Cryptography is everywhere
3
Consumer devices
4
RSA Authentication
5
How does it work
6
Authentication
7
Attacks
8
Faults
9
Theory
10
Hardware
11
Openssl Authentication
12
Private Key Instruction
13
Simple Case
14
Fault Injection
15
Final Result
16
Last Attempt
17
Analysis
18
Conclusions
19
Takehome message
Description:
Explore a comprehensive analysis of hardware vulnerabilities in secure computing systems through this Black Hat USA 2012 conference talk. Delve into a detailed end-to-end security attack on a microprocessor system, demonstrating how hardware weaknesses can be exploited to compromise software-secure systems. Learn about a side-channel attack on the RSA signature algorithm using transient hardware faults induced through various methods. Discover the process of extracting private RSA keys from erroneously signed messages affected by single-bit faults during Fixed Window Exponentiation. Examine the attack implementation using an FPGA platform with a SPARC-based microprocessor running unmodified Linux and OpenSSL. Understand the implications of this attack, which requires only proximity to the victim system and leaves no detectable trail. Witness a live demonstration of the attack on an FPGA platform using a simplified 128-bit private key system.

Torturing OpenSSL

Black Hat
Add to list