[Resource Topic] 2016/230: ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Welcome to the resource topic for 2016/230

Title:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

Authors: Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom

Abstract:

We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA secret signing keys from OpenSSL and CoreBitcoin running on iOS devices, and partial key leakage from OpenSSL running on Android and from iOS’s CommonCrypto. These non-intrusive attacks use a simple magnetic probe placed in proximity to the device, or a power probe on the phone’s USB cable. They use a bandwidth of merely a few hundred kHz, and can be performed cheaply using an audio card and an improvised magnetic probe.

ePrint: https://eprint.iacr.org/2016/230

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .