Through suitable cryptanalysis and signal processing, we have extracted 4096-bit RSA keys and 3072-bit ElGamal keys from laptops, via each of these channels, as well as via power analysis and electromagnetic probing. Despite the GHz-scale clock rate of the laptops and numerous noise sources, the full attacks require a few seconds of measurements using Medium Frequency signals (around 2 MHz), or one hour using Low Frequency signals (up to 40 kHz).
Category / Keywords: implementation / side channel attack, power analysis, RSA key extraction Original Publication (in the same form): IACR-CHES-2014 Date: received 13 Aug 2014, last revised 20 Aug 2014 Contact author: tromer at cs tau ac il Available format(s): PDF | BibTeX Citation Note: Extended version Version: 20140820:211405 (All versions of this report) Short URL: ia.cr/2014/626 Discussion forum: Show discussion | Start new discussion