Hardware attack on RSA implementation

Researchers at the University of Michigan have succeeded in accessing the private RSA key used by an embedded processor by manipulating the power supply to the processor. The attack targets the calculation of RSA signatures using the FWE (fixed window exponentiation) algorithm, which is used, for example, in the OpenSSL cryptographic library. The attack was carried out on a SPARC-based Leon3 Soc embedded processor, which runs on an FPGA from Xilinx and is, according to the researchers, a representative embedded system.

Click here to read the complete University of Michigan white paper about this subject.



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: