Submit Search
Upload
Side channel attacks
•
Download as ODP, PDF
•
4 likes
•
3,348 views
Stefan Fodor
Follow
second presentation on IT Security.
Read less
Read more
News & Politics
Technology
Report
Share
Report
Share
1 of 11
Download now
Recommended
12 symmetric key cryptography
12 symmetric key cryptography
drewz lin
13 asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
Cryptography.ppt
Cryptography.ppt
Uday Meena
Ethical Hacking
Ethical Hacking
Sanu Subham
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
Hardware Trojans
Hardware Trojans
Rahul Krishnamurthy
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
Cryptography
Cryptography
Sagar Janagonda
Recommended
12 symmetric key cryptography
12 symmetric key cryptography
drewz lin
13 asymmetric key cryptography
13 asymmetric key cryptography
drewz lin
Cryptography.ppt
Cryptography.ppt
Uday Meena
Ethical Hacking
Ethical Hacking
Sanu Subham
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
Sunita Kharayat
Hardware Trojans
Hardware Trojans
Rahul Krishnamurthy
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
Cryptography
Cryptography
Sagar Janagonda
Diffiehellman
Diffiehellman
chenlahero
Cipher techniques
Cipher techniques
Mohd Arif
I P S P O O F I N G
I P S P O O F I N G
avinashkanchan
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
Advanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Cryptography
Cryptography
gueste4c97e
Brute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
DNS Attacks
DNS Attacks
Himanshu Prabhakar
Cryptography
Cryptography
Tushar Swami
User authentication
User authentication
CAS
RSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
Hash function
Hash function
Salman Memon
RSA Algorithm
RSA Algorithm
Srinadh Muvva
Android malware presentation
Android malware presentation
Sandeep Joshi
Mobile Malware
Mobile Malware
Martin Holovský
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
More Related Content
What's hot
Diffiehellman
Diffiehellman
chenlahero
Cipher techniques
Cipher techniques
Mohd Arif
I P S P O O F I N G
I P S P O O F I N G
avinashkanchan
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
Advanced cryptography and implementation
Advanced cryptography and implementation
Akash Jadhav
Cryptography
Cryptography
gueste4c97e
Brute force-attack presentation
Brute force-attack presentation
Mahmoud Ibra
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
DNS Attacks
DNS Attacks
Himanshu Prabhakar
Cryptography
Cryptography
Tushar Swami
User authentication
User authentication
CAS
RSA ALGORITHM
RSA ALGORITHM
Shashank Shetty
Hash function
Hash function
Salman Memon
RSA Algorithm
RSA Algorithm
Srinadh Muvva
Android malware presentation
Android malware presentation
Sandeep Joshi
Mobile Malware
Mobile Malware
Martin Holovský
RC4&RC5
RC4&RC5
Mohamed El-Serngawy
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Information Security Awareness Group
What's hot
(20)
Diffiehellman
Diffiehellman
Cipher techniques
Cipher techniques
I P S P O O F I N G
I P S P O O F I N G
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Advanced cryptography and implementation
Advanced cryptography and implementation
Cryptography
Cryptography
Brute force-attack presentation
Brute force-attack presentation
Introduction to Cryptography
Introduction to Cryptography
DNS Attacks
DNS Attacks
Cryptography
Cryptography
User authentication
User authentication
RSA ALGORITHM
RSA ALGORITHM
Hash function
Hash function
RSA Algorithm
RSA Algorithm
Android malware presentation
Android malware presentation
Mobile Malware
Mobile Malware
RC4&RC5
RC4&RC5
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
Similar to Side channel attacks
01-intro-thompson.ppt
01-intro-thompson.ppt
SadiaMuqaddas
Computer and Network Security
Computer and Network Security
Asif Raza
01-intro-thompson.ppt
01-intro-thompson.ppt
MarcoAntonioSotoVera
01-intro-thompson.ppt
01-intro-thompson.ppt
ROHITCHHOKER3
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Zarafa
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
RamithaDevi
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
rishabhawasthi0365
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Peter Wood
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
samirapdcosden
Introduction to security
Introduction to security
Mostafa Elgamala
Dc 11 Brucepotter
Dc 11 Brucepotter
Object-Frontier Software Pvt. Ltd
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
Sravani Reddy
IS Security Presentation
IS Security Presentation
Renjith K P
Similar to Side channel attacks
(13)
01-intro-thompson.ppt
01-intro-thompson.ppt
Computer and Network Security
Computer and Network Security
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
01-intro-thompson.ppt
Mobile security 8soft_final_summercamp2011
Mobile security 8soft_final_summercamp2011
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
Tdffffffffffffffffffffffffffffffffffffffehranipoor.pdf
L10_biometricsforengineeringandreport.ppt
L10_biometricsforengineeringandreport.ppt
The Consumerisation of Corporate IT
The Consumerisation of Corporate IT
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Chapter 6Authenticating PeopleChapter 6 OverviewThe th
Introduction to security
Introduction to security
Dc 11 Brucepotter
Dc 11 Brucepotter
Hacking Tutorial in Telugu
Hacking Tutorial in Telugu
IS Security Presentation
IS Security Presentation
More from Stefan Fodor
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Stefan Fodor
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
Stefan Fodor
PacMan Rebourn
PacMan Rebourn
Stefan Fodor
Attack of the BEAST
Attack of the BEAST
Stefan Fodor
Risk assesment IT Security project
Risk assesment IT Security project
Stefan Fodor
It Security Project
It Security Project
Stefan Fodor
Squash that Bug!
Squash that Bug!
Stefan Fodor
Protocols for Embedded Node
Protocols for Embedded Node
Stefan Fodor
Qualys Threads
Qualys Threads
Stefan Fodor
2FLogin
2FLogin
Stefan Fodor
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Stefan Fodor
Ruby on Rails 3
Ruby on Rails 3
Stefan Fodor
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
Stefan Fodor
dry_run_exam
dry_run_exam
Stefan Fodor
Facebook
Facebook
Stefan Fodor
Logs
Logs
Stefan Fodor
Reconnaissance software
Reconnaissance software
Stefan Fodor
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Stefan Fodor
Network proj 1.1
Network proj 1.1
Stefan Fodor
Network telnet ssh
Network telnet ssh
Stefan Fodor
More from Stefan Fodor
(20)
Coding Gateway - Exam Stefan
Coding Gateway - Exam Stefan
Collaboration Tools and Methods in Software Development
Collaboration Tools and Methods in Software Development
PacMan Rebourn
PacMan Rebourn
Attack of the BEAST
Attack of the BEAST
Risk assesment IT Security project
Risk assesment IT Security project
It Security Project
It Security Project
Squash that Bug!
Squash that Bug!
Protocols for Embedded Node
Protocols for Embedded Node
Qualys Threads
Qualys Threads
2FLogin
2FLogin
Lillebaelt Academy - ro
Lillebaelt Academy - ro
Ruby on Rails 3
Ruby on Rails 3
Special Subject 1+2: RoR 2
Special Subject 1+2: RoR 2
dry_run_exam
dry_run_exam
Facebook
Facebook
Logs
Logs
Reconnaissance software
Reconnaissance software
Special Subject 1+2: RoR 1
Special Subject 1+2: RoR 1
Network proj 1.1
Network proj 1.1
Network telnet ssh
Network telnet ssh
Recently uploaded
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
Delhi Call girls
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
FahimUddin61
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
sammehtumblr
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
Andy (Avraham) Blumenthal
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
narsireddynannuri1
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Delhi Call girls
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
AlexisTorres963861
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
get joys
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
anjanibaddipudi1
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
FIRST INDIA
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
Axel Bruns
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
FIRST INDIA
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Delhi Call girls
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Delhi Call girls
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
kfjstone13
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
PsychicRuben LoveSpells
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
bhavenpr
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
Delhi Call girls
Recently uploaded
(20)
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Nara Chandrababu Naidu's Visionary Policies For Andhra Pradesh's Development
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 48 (Gurgaon)
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
Side channel attacks
1.
Side-Channel Attacks
Stefan FODOR(backb0ne fl00d3r ) 1 day before June 'couse the true 1337 hax0rs don't care about vulnerabilities
2.
3.
Classes of side
channel attack
4.
Examples
5.
Countermeasures
6.
Questions?
7.
8.
9.
10.
11.
Power monitoring attacks
12.
Electromagnetic attacks
13.
Acoustic cryptoanalysis
14.
Differential fault analysis
15.
16.
Apache + mod_SSL
17.
Compared time needed
to decrypting multiple requests
18.
They deduced multiple
1024 bit private-key
19.
20.
Bad : recovered
96% of the text based on audio
21.
Worse : 69%
of all 10 random character password
22.
Worst : works
on ATMs, too
23.
24.
Monitor the electromagnetic
field of the smart-phone performing encryptions
25.
Deduces the encryption
key
26.
27.
Recover the disk
encryption key
28.
… after freezing
the RAM Memory
29.
Released in July
2008, still no decent remedy
30.
31.
Questions?
32.
33.
http://en.wikipedia.org/wiki/Side_channel_attack
34.
http://www.berkeley.edu/news/media/releases/2005/09/14_key.shtml
35.
http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf
36.
http://citp.princeton.edu/memory/
37.
http://www.youtube.com/watch?v=4L8rnYhnLt8
Editor's Notes
Not to be confused with social engineering
* 2 guys from Stanford University * timming usualy performed on smartcard reader * a lot of math and graphs
* Each key sounds different * University of Berkeley * September 2005 * use of statistics: the more likely then tjw
* March 2011 * works from 2 meters away
Cache as RAM
Download now