
The sensitive information is recovered with a non-supervised machine learning method and plugged into a customized lattice-based attack scheme.įinally, 4000 ECDSA observations were enough to recover the (known) secret key on Rhea and validate our attack process. We could then show that the electromagnetic side-channel signal bears partial information about the ECDSA ephemeral key. Rhea, as an open JavaCard platform, gives us more control to study the ECDSA engine. Freely available on the web, this product looks very much like the NXP A700X chip and uses the same cryptographic library. To understand the NXP ECDSA implementation, find a vulnerability and design a key-recovery attack, we had to make a quick stop on Rhea (NXP J3D081 JavaCard smartcard). In other words, an attacker can create a clone of a legitimate Google Titan Security Key.

Our work describes a side-channel attack that targets the Google Titan Security Key’s secure element (the NXP A700X chip) by the observation of its local electromagnetic radiations during ECDSA signatures (the core cryptographic operation of the FIDO U2F protocol). The Google Titan Security Key is a FIDO U2F hardware device proposed by Google (available since July 2018) as a two-factor authentication token to sign in to applications (e.g.
