AES-256 Encryption Keys Cracked Wirelessly Using Inexpensive Kit

Researchers have demonstrated that attacks that glean sensitive information from computer systems by monitoring the electromagnetic signals they produce can now be carried out with equipment costing as little as 200 euros (£176).

Dutch security firm Fox-IT said it had successfully extracted secret AES-256 encryption keys from a distance of up to one metre using kit that could fit into a jacket pocket.

Side-channel attack

Such side-channel attacks have been widely known for some time, but in the past have required unrestricted physical access to the target system.

Fox-IT said its demonstration marks the first time such an attack has been possible from a distance, due to improvements in antenna and signal processing technology.

The technology used included a simple loop antenna, an external amplifier and bandpass filters bought from an electronics shop and a 20-euro software-defined radio USB dongle.

The kit was used to record the electromagnetic signals generated by a SmartFusion2-powered system with an AES operation running on its ARM Cortex-M3 core.

The setup recorded signals leaking from the AHB bus linking the ARM core and the on-chip memory, showing different levels of power consumption during the stages of the operation.

Key cracked

Running a different encryption operation on a parallel test system allowed the researchers to correlate the chip’s power consumption to individual bytes of information, so that they could single out 256 possible values for each of the key’s 32 bytes, down from 2256 for a pure brute-force attack.

That meant the entire key could be guessed in only 50 seconds for signals recorded at 30 centimetres.

“In contrast, a direct brute-force attack on AES-256 would require 2,256 guesses (per byte) and would not complete before the end of the universe,” the researchers wrote.

The time needed rose to five minutes for data recorded at 1 metre, but the firm said the speed and range would be improved with the use of more expensive equipment.

Real-world conditions

“This is not a game exclusively for nation states, but also anyone with pocket money and some free time,” Fox-IT said in its study. “This again underscores the need for deep expertise and defense-in-depth when designing high assurance systems.”

The company said the attack outlined was possible at 30 centimetres under realistic conditions, while the longer-range effort was successful only in a laboratory environment, where it wasn’t necessary to filter out other signals that might interfere with capturing the necessary data.

“This research… investigates attack techniques under conditions close to real world environments,” the company said. “This knowledge can be used to offer products with improved countermeasures, above and beyond any aging standards.”

Put your knowledge of artificial intelligence (AI) to the test. Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

8 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

11 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

12 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

13 hours ago