Beruflich Dokumente
Kultur Dokumente
Near Field
Communication
phone
Backend Server
Cipher
Karsten Nohl - Hardware Security 5
Cipher
Cipher
Reverse-engineering algorithms
Finding secret ciphers
Exploiting proprietary encryption
Specs suggested
mediocre security
at best:
Stream cipher
with small 48 bit key Car thefts
(source: hldi.org)
Stitching images
Panorama software (hugin)
Each image ~100x100 μm
Logic Transistor
layer layer
- -
A
Karsten Nohl - Hardware Security 32
Y
A B
Karsten Nohl - Hardware Security 33
www.siliconzoo.org
RNG +
f(∙)
+ + 48-bit LFSR
ID
Mutual authentication 48-bit stream cipher
protocol
Our Attack:
Control timing (OpenPCD)
48-bit LFSR
Security
No Crypto
Everything needed
to disclose key is
found on chip Proprietary
Encrypted
key Decryption
Chip key or
Secret algorithms
can be found; might
access password
be costly (>$100,000)
Encrypted Proprietary
key Decryption
AES / 3DES
Card key