Home / Series / Chaos Communication Congress / Aired Order / Season 30 / Episode 46

Extracting keys from FPGAs, OTP Tokens and Door Locks (#5417)

Speaker: David Side-Channel (and other) Attacks in Practice Side-channel analysis (SCA) and related methods exploit physical characteristics of a (cryptographic) implementations to bypass security mechanisms and extract secret keys. Yet, SCA is often considered a purely academic exercise with no impact on real systems. In this talk, we show that this is not the case: Using the example of several wide-spread real-world devices, we demonstrate that even seemingly secure systems can be attacked by means of SCA with limited effort.

English
  • Originally Aired December 28, 2013
  • Runtime 60 minutes
  • Production Code 5417
  • Created January 10, 2015 by
    Administrator admin
  • Modified January 10, 2015 by
    Administrator admin