Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday August 15 2018, @04:11PM   Printer-friendly
from the better-than-sniffing-glue dept.

If you missed the OpenSSL update released in May, go back and get it: a Georgia Tech team recovered a 2048-bit RSA key from OpenSSL using smartphone processor radio emissions, in a single pass.

The good news is that their attack was on OpenSSL 1.1.0g, which was released last November, and the library has been updated since then. Dubbed “One&Done”, the attack was carried out by Georgia tech's Monjur Alam, Haider Adnan Khan, Moumita Dey, Nishith Sinha, Robert Callan, Alenka Zajic, and Milos Prvulovic.

The researchers only needed a simple and relatively low cost Ettus USRP B200 mini receiver (costing less than $1,000/€900/£800) to capture the revealing radio noise from a Samsung Galaxy phone, an Alcatel Ideal phone, and a A13-OLinuXino single-board computer.

In Georgia Tech's announcement, the group explained that its attack is the first to crack OpenSSL without exploiting cache timing or organisation.

[...] The good news is that not only was mitigation relatively simple, it improved OpenSSL's performance. “Our mitigation relies on obtaining all the bits that belong to one window at once, rather than extracting the bits one at a time,” the paper stated. “For the attacker, this means that there are now billions of possibilities for the value to be extracted from the signal, while the number of signal samples available for this recovery is similar to what was originally used for making a binary (single-bit) decision”.

“This mitigation results in a slight improvement in execution time of the exponentiation,” the paper continued.

Here's the link to the group's upcoming Usenix talk.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by driverless on Thursday August 16 2018, @01:05AM

    by driverless (4770) on Thursday August 16 2018, @01:05AM (#721988)

    It's not just an OpenSSL vuln, they're just the biggest target and make for good news stories. This is an EMI side-channel attack, if you want to mitigate those you need hardware-level defences, you're never going to be able to deal with it purely in software. Even then, hardware vendors have been trying to deal with these types of attacks for decades, with mixed success. The best defence is still, if someone walks up to you and points a pile of high-tech electronic equipment at the device you're using for crypto, or attaches probes to it, or whatever, then you might want to be suspicious that they're up to something.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2