DUTCH RESEARCHERS have discovered a way of cracking AES-256 encryption using reasonably cheap gear and wireless tech.
Fox-IT explains that it, and an other company called Riscure, have created a new method for slurping up security that is enabled through proximity and relies on the monitoring of electromagnetic signals in what is known as a side channel attack.
Researchers put together a piece of kit worth less than $200 and were able to wirelessly extract secret AES-256 encryption keys from a distance of one metre. They said that the attack can be carried out by people on all budgets and with all kinds of means.
"The recording hardware can range from extremely high-end radio equipment, down to €20 USB SDRs. We have found that even the cheap USB dongles can be used to attack software implementations!" they said. "This is not a game exclusively for nation states, but also anyone with pocket money and some free time (PDF)."
Usually, such an attack would require direct access and manipulation, but Fox-IT found that it was possible just to swan past the target with a bag of SDR, amplifiers, filters, and an antenna and catch a winner in record time.
"Using this approach only requires us to spend a few seconds guessing the correct value for each byte in turn (256 options per byte, for 32 bytes — so a total of 8192 guesses)," boasts the firm.
"In contrast, a direct brute-force attack on AES-256 would require 2^256 guesses and would not complete before the end of the universe"
The next challenge is distance. Currently, Fox-IT has met reached a goal of 30cm but says that a full meter is a possibility given the right circumstances.
"Our work here has shown a proof of concept for TEMPEST attacks against symmetric crypto such as AES-256. To the best of our knowledge, this is the first public demonstration of such attacks. The low bandwidth requirements have allowed us to perform the attack with surprisingly cheap equipment (€20 radio, modest amplifiers and filters) at significant distances," it added.
"In practice this setup is well suited to attacking network encryption appliances. Many of these targets perform bulk encryption (possibly with attacker controlled data) and the ciphertext is often easily captured from elsewhere in the network." µ
Welcome to the dystopia Black Mirror warned us about
Microsoft in 'more helpful' shock
A whole new way to be tied to your ISP
Search giant puts Epyc chips at the heart of its datacentre servers