[Libre-soc-dev] power side-channel attack on intel processors

Luke Kenneth Casson Leighton lkcl at lkcl.net
Tue Nov 10 21:53:31 GMT 2020

i was at the IIT Madras Conference where someone gave a talk about
power analysis attacks against Rijndael.  get this: measuring the
power consumption of the FPU leaked key information 100% successfully.

Rijndael does not use or require FP.

the leakage path? the instruction decoder in the Shakti core being
investigated happened to link to an FP reg through some OR gated paths
that, later on, were ANDed out.

this was sufficient information to tell what *integer* instructions
were doing and thus obtain the private key.

executing security algorithms in software is generally hopelessly
compromised if you have access to a power statistical inference
channel.  the usual one people expect is timing, but not power.


On 11/10/20, Jacob Lifshay <programmerjake at gmail.com> wrote:
> makes for interesting reading:
> https://platypusattack.com/
> Jacob
> _______________________________________________
> Libre-soc-dev mailing list
> Libre-soc-dev at lists.libre-soc.org
> http://lists.libre-soc.org/mailman/listinfo/libre-soc-dev

More information about the Libre-soc-dev mailing list