Menu
Cart 0
The Last HOPE (2008): "The (Im)possibility of Hardware Obfuscation" (Download)

The Last HOPE (2008): "The (Im)possibility of Hardware Obfuscation" (Download)

  • 099


Friday, July 18, 2008: 10:00 am (Turing): This talk will discuss several different approaches to reverse engineering proprietary algorithms from hardware. It will focus on our mostly automated approach to reconstructing functionality by using a combination of analyzing photos of chip structures and protocol analysis. Using these techniques, the Mifare RFID tags were hacked, which caused quite a bit of public discussion about proprietary cryptography and "security by obscurity". The cryptography of the Mifare tags has several vulnerabilities including weaknesses in the random number generator and low resistance against brute force attacks. Furthermore, statistical flaws of the cipher enable very practical key-recovering attacks. This presentation will show the whole range of attacks as well as some general techniques to improve cryptographic protocols so they are more resistant.

Hosted by Karsten Nohl