TY - GEN
T1 - Optical Cryptanalysis
T2 - 30th ACM SIGSAC Conference on Computer and Communications Security, CCS 2023
AU - Nassi, Ben
AU - Vayner, Ofek
AU - Iluz, Etay
AU - Nassi, Dudi
AU - Jancar, Jan
AU - Genkin, Daniel
AU - Tromer, Eran
AU - Zadov, Boris
AU - Elovici, Yuval
N1 - Publisher Copyright: © 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM
PY - 2023/11/15
Y1 - 2023/11/15
N2 - Although power LEDs have been integrated in various devices that perform cryptographic operations for decades, the cryptanalysis risk they pose has not yet been investigated. In this paper, we present optical cryptanalysis, a new form of cryptanalytic side-channel attack, in which secret keys are extracted by using a photodiode to measure the light emitted by a device's power LED and analyzing subtle fluctuations in the light intensity during cryptographic operations. We analyze the optical leakage of power LEDs of various consumer devices and the factors that affect the optical SNR. We then demonstrate end-to-end optical cryptanalytic attacks against a range of consumer devices (smartphone, smartcard, and Raspberry Pi, along with their USB peripherals) and recover secret keys (RSA, ECDSA, SIKE) from prior and recent versions of popular cryptographic libraries (GnuPG, Libgcrypt, PQCrypto-SIDH) from a maximum distance of 25 meters.
AB - Although power LEDs have been integrated in various devices that perform cryptographic operations for decades, the cryptanalysis risk they pose has not yet been investigated. In this paper, we present optical cryptanalysis, a new form of cryptanalytic side-channel attack, in which secret keys are extracted by using a photodiode to measure the light emitted by a device's power LED and analyzing subtle fluctuations in the light intensity during cryptographic operations. We analyze the optical leakage of power LEDs of various consumer devices and the factors that affect the optical SNR. We then demonstrate end-to-end optical cryptanalytic attacks against a range of consumer devices (smartphone, smartcard, and Raspberry Pi, along with their USB peripherals) and recover secret keys (RSA, ECDSA, SIKE) from prior and recent versions of popular cryptographic libraries (GnuPG, Libgcrypt, PQCrypto-SIDH) from a maximum distance of 25 meters.
KW - Cryptanalysis
KW - ECDSA
KW - RSA
KW - SIKE
KW - Side-Channel Attack
UR - http://www.scopus.com/inward/record.url?scp=85179852242&partnerID=8YFLogxK
U2 - 10.1145/3576915.3616620
DO - 10.1145/3576915.3616620
M3 - Conference contribution
T3 - CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
SP - 268
EP - 280
BT - CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
Y2 - 26 November 2023 through 30 November 2023
ER -