You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: the_imposters/notes.md
+38-41Lines changed: 38 additions & 41 deletions
Original file line number
Diff line number
Diff line change
@@ -17,16 +17,16 @@ In fact, we found our input and output corrolations were right next to each othe
17
17
We've tried upping the trace count to 100k, and doing expansive SBox and MixColumn based attacks. We also re-ran the IKM attack to make sure we had the parameters correct. With our setup, we can mount that two-round attack with roughly 60 traces. There's no way we need more than 100k to get The Imposters.
18
18
19
19
However, analysis of Car Key Fob Hardware Backdoor traces showed a very similar pattern, that we think is likely hardware AES. The theory is that the distinctive block/block/small-block/block pattern we see is actually:
20
-
* loading the 16-byte AES key
21
-
* loading the plaintext
22
-
* doing the HW AES routine
23
-
* reading out the ciphertext
20
+
* loading the 16-byte AES key
21
+
* loading the plaintext
22
+
* doing the HW AES routine
23
+
* reading out the ciphertext
24
24
25
25
The data correlations and timings all line up for this. Assuming it's the case, we then have 16 hardware AES operations, of which 15 are imposters, and one is real. We can easily identify the real one by using data correlations. Also, we note that which operation has correlations varies per reset. Next step: mount a hardware AES attack on the identified operation.
* Note that for ARK XOR lARK, the first hit is weirdly positioned
115
+
- might be because of an odd "previous"
116
+
- obvious candidate before is 4f
119
117
120
118
## Known Key Attacks
121
119
Since we couldn't get the key to fall out, we tried another tack. We wrote our own version of the challenge for an XMEGA 128 A3U processor we had, and went hunting for known-key on it. We found that the key bytes we correlated diagonally. A little math later, we found they were being processed in ShiftRows order.
122
120
123
121
Armed with that knowledge, we were able to mount an attack that worked on our known-key version, and which transferred to the RHme3 target. Success.
0 commit comments