From pgut001@cs.auckland.ac.nz Fri Jul 6 02:33:34 2018 From: Peter Gutmann To: cypherpunks-legacy@lists.cpunks.org Subject: Re: [cryptography] Military chip crypto cracked with power-analysis probe Date: Fri, 06 Jul 2018 02:33:34 +0000 Message-ID: <172289269065.3881296.13470942088078802603.generated@mail.pglaf.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============8211744419017265151==" --===============8211744419017265151== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Jeffrey Walton writes: >http://www.theregister.co.uk/2011/07/27/chip_crypto_cracked/ That's a really, really misleading tagline. They've successfully attacked th= e=20 bitstream encryption for Xilinx FPGAs, and while some of those are used by th= e=20 military, they're also used in vast numbers of other things. In addition=20 recovering the bitstream doesn't help you break any crypto the military may=20 have implemented in the FPGA. I guess "Tamagotchi encryption cracked"[0] doesn't make as good a headline. Peter. [0] Yeah, I know, technically they use an ASIC not an FPGA. Insert the name = of some no-consequence FPGA-using toy here. _______________________________________________ cryptography mailing list cryptography(a)randombit.net http://lists.randombit.net/mailman/listinfo/cryptography ----- End forwarded message ----- --=20 Eugen* Leitl leitl http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://www.ativel.com http://postbiota.org 8B29F6BE: 099D 78BA 2FD3 B014 B08A 7779 75B0 2443 8B29 F6BE --===============8211744419017265151==--