Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware
نویسندگان
چکیده
Atmel’s CryptoMemory devices are non-volatile memories with cryptographically secured access control. Recently, the authentication mechanism of these devices have been shown to be severely vulnerable. More precisely, to recover the secret key the published attack requires only two to six days of computation on a cluster involving 200 CPU cores. In this work, we identified and applied theoretical improvements to this attack and mapped it to a reconfigurable computing cluster, known as RIVYERA. Our solution provides significantly higher performance exceeding the previous implementation by a factor of 7.27, revealing the secret key obtained from the internal state in 0.55 days on average using only 30 authentication frames.
منابع مشابه
Attacking Code-Based Cryptosystems with Information Set Decoding Using Special-Purpose Hardware
In this work, we describe the first implementation of an information set decoding (ISD) attack against code-based cryptosystems like McEliece or Niederreiter using special-purpose hardware. We show that in contrast to other ISD attacks due to Lee and Brickel [7], Leon [8], Stern [15] and recently [9] (May et al.) and [2] (Becket et al.), reconfigurable hardware requires a different implementati...
متن کاملA Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality
Java Card is now a mature and accepted standard for smart card and SIM technology. Java Card is distinguished primarily by its independence from hardware platforms and portability and is now the most important open standard. However, the main concern of Java Card is now its low execution speed caused by the hardware limitation. In this paper, we propose how to improve a execution speed of Java ...
متن کاملAtmel AVR1631: Single Phase Energy Meter using XMEGA A
• Low-cost, Class 1 single-phase energy meter solution • Low and cost effective capacitive power supply • External low frequency crystal for RTC • Battery backup for internal RTC • LCD interface through GPIO • Multiple tamper detection • Multiple measurement parameters • One-time, quick, and accurate digital calibration gives added benefits • Internal EEPROM to store calibration parameters, tam...
متن کاملAT90S1200 Summary, 8-bit AVR MCU with 1K Byte of In-System Programmable Flash
Features • Utilizes the AVR® RISC Architecture • AVR – High-performance and Low-power RISC Architecture – 89 Powerful Instructions – Most Single Clock Cycle Execution – 32 x 8 General-purpose Working Registers – Up to 12 MIPS Throughput at 12 MHz • Data and Nonvolatile Program Memory – 1K Byte of In-System Programmable Flash Endurance: 1,000 Write/Erase Cycles – 64 Bytes of In-System Programmab...
متن کاملAre Crypto-Accelerators Really Inevitable? 20Bit Zero-Knowledge in Less than a Second on Simple 8-bit Microcontrollers
This paper describes in detail a recent smart-card prototype that performs a 20-bit zero-knowledge identification in less than one second on a simple 8-bit microcontroller without any dedicated cryptoengine aboard. A curious property of our implementation is its inherent linear complexity: unlike all the other protocols brought to our knowledge, the overall performance of our prover (computatio...
متن کامل