Side-channel analysis (SCA) of PIN comparison #24
tsusanka
announced in
Past Security Issues
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Details
Using a SCA bench an attacker could create the database of power consumption and electromagnetic traces of a device. This database could later be used to unlock a locked device using the same SCA bench. The issue was fixed by rewriting the device storage to not compare PINs directly, but rather compare random data stretched by the PIN.
Fix
trezor/trezor-firmware@4f32cb5
Read more
Official blogpost
Beta Was this translation helpful? Give feedback.
All reactions