Podcast
Root Causes 333: Intel Side Channel Attack Steals Private Keys


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
September 21, 2023
A newly revealed side channel attack can capture AES encryption keys from Intel chips. We explain this significant and powerful attack.
Podcast Transcript
Lightly edited for flow and brevity.
So Intel has posted on this if you want to look at it. Really, you’re talking about registers within the affected chips that are really, a lot of thought has gone into how to not leak information within these chips and so things like Intel SGX, right, hardware based memory encryption technology, these are all things that we've heard about. I don't know if we talked about that much on this podcast, but it really is ways to try to protect from side channel attacks, a way from protecting from leakages. But the problem is that it looks like registers within these chips are giving up and what I mean by that, they are literally leaking characters, bits from these registers that allow attackers to actually determine from the leaked memory essentially AES 128 bit and 256 encryption keys.
There were demonstrations of this by the researcher, Daniel Moghimi, I believe. Forgive me if I pronounced that wrong. But, it was demonstrated that AES encryption keys were actually lifted from the chip by looking at these registers, which are giving up information and one of the reasons why they're giving up that information is because of Intel, of course, wanting to be very, very efficient in its usage and spec, you might have heard about things like speculative computing within these chips, so that the chips are actually super-duper optimized for how memory handling is happening. And unfortunately, because of this optimization within the chip, there seems to be some data leakage at the register level, allowing for this kind of an attack. And what's scary, Tim, just to put the final thought on it is, that's a lot of chips over a significant number of years and, that's why people have called it out earlier on August. And that's why we want to talk about it here.
If you want to read more about this, apparently, I wasn't at BlackHat this year, Tim, but apparently, so at the USENIX Security Symposium, August 11, and BlackHat August 9. Obviously, there's a presentation on this floating around. Intel has talked about ideas for how to mitigate. The problem is mitigating this might actually really degrade the performance of your chip. It's such a significant problem. That is why we're calling it out here on the podcast for people who are using that particular generation of chips within their computing systems, you just, you're gonna have to be aware of this.
Side channel attacks, I feel like we're hearing about them more and more. Do you think this is an attack vector that's on the rise?
We're talking 6th to 11th Generation Intel Core CPUs. We are talking about probably chips counting in the billions. So not even the hundreds of millions. We’re talking billions of processors that apply to that. And that these chips are going to be used in both personal computers, enterprise computers, as well as. Tim, and here's a softball you can knock out of the park for me. It also went into a whole lot of cloud computers as well. Think about that for a moment. The problem with if this vulnerability is up in the cloud, then what happens if you're on a shared computer resource?

