Categories: HackingSecurity

A new Side channel attack-how to steal encryption keys by touching PCs

Researchers demonstrated a new side channel attack which allow them to steal encryption keys by simply touching a laptop.

Yesterday I published a post on an interesting research conducted by a the team of experts which demonstrated an attack exploits “a newly discovered public side channel” allowing threat actor to access the shared memory statistics of an app’s process, today we will discuss of a new potential method for extracting sensitive data from PCs simply touching it.

The team highlights the importance of physical security for computers, side channel attack like the one implemented by the experts demonstrates the lack of scrutiny on physical threats by the security community.

The researchers at Tel Aviv Un+iversity, Eran Tromer, Daniel Genkin, and Itamar Pipman demonstrated a physical side-channel Key-Extraction attack on PCs.

We demonstrated physical side-channel attacks on a popular software implementation of RSA and ElGamal, running on laptop computers. Our attacks use novel side channels and are based on the observation that the “ground” electric potential in many computers fluctuates in a computation-dependent way. An attacker can measure this signal by touching exposed metal on the computer’s chassis with a plain wire, or even with a bare hand. The signal can also be measured at the remote end of Ethernet, VGA or USB cables.” explained the researchers.

The researchers will present the study at Workshop on Cryptographic Hardware and Embedded Systems 2014 (CHES 2014) in Korea, on September 23th

The researchers explained that the new side channel attack allows to extract encryption keys by measuring the electrical signals of those keys being processed, this means that theoretically bad actors could access encrypted keys through touching the chassis of the targeted PC.

we have extracted 4096-bit RSA keys and 3072-bit ElGamal keys from laptops, via each of these channels, as well as via power analysis and electromagnetic probing. Despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using Medium Frequency signals (around 2 MHz), or one hour using Low Frequency signals (up to 40 kHz). ” added the researchers.

The experts conducted successfully the tests with various models of laptops, running GnuPG, it’s not difficult to imagine the potentially of such attack conducted by cyber criminals and intelligence agencies.

Hackers can steal encrypted keys used  by victims for various services like online banking.

The researchers explained that to syphon the encryption keys, the CPU has to actually be processing those keys at the moment the signal is being measured. Under this condition the attack is easy to perform and the results are excellent, tests with GnuPG allowed the researchers to:

distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and
fully extract decryption keys, by measuring the laptop’s chassis potential during decryption of a chosen ciphertext.

Despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using Medium Frequency signals (around 2 MHz), or one hour using Low Frequency signals (up to 40 kHz). the post states.

One of the researchers said that there is no evidence that the side channel attack they have tested was already being used.

The team proposed mitigation techniques to avoid being a victim of the new type of side channel attack:

“Physical mitigation techniques include Faraday cages (against EM attacks), insulating enclosures (against chassis and touch attacks), and photoelectric decoupling or fiber optic connections (against ‘far end of cable’ attacks).”

But sincerely these countermeasures are not easy to adopt and too expensive to implement, but the researcher also added that anyway software-based countermeasures can be developed by manufacturers.

Pierluigi Paganini

(Security Affairs – hacking,  Side channel attack)  

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

5 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

12 hours ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

18 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

19 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

1 day ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

2 days ago

This website uses cookies.