all InfoSec news
Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller. (arXiv:2203.08220v1 [cs.CR])
March 17, 2022, 1:20 a.m. | Utsav Banerjee, Lisa Ho, Skanda Koppula
cs.CR updates on arXiv.org arxiv.org
We demonstrate the extraction of an AES secret key from flash memory on the
ATMega328 microcontroller (the microcontroller used on the popular Arduino
Genuino/Uno board). We loaded a standard AVR-architecture AES-128
implementation onto the chip and encrypted randomly chosen plaintexts with
several different keys. We measured the chip's power consumption during
encryption, correlated observed power consumption with the expected power
consumption of the plaintexts with every possible key, and ultimately extracted
the 128-bit key used during AES. We describe here …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Digital Trust Cyber Transformation Senior
@ KPMG India | Mumbai, Maharashtra, India
Security Consultant, Assessment Services - SOC 2 | Remote US
@ Coalfire | United States
Sr. Systems Security Engineer
@ Effectual | Washington, DC
Cyber Network Engineer
@ SonicWall | Woodbridge, Virginia, United States
Security Architect
@ Nokia | Belgium