this post was submitted on 21 Mar 2024
97 points (96.2% liked)

Technology

34894 readers
833 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] knightly@pawb.social 14 points 7 months ago* (last edited 7 months ago) (2 children)

A "side-channel attack" is one where fundamental flaws in the encryption implementation method are targeted, as opposed to flaws in the cryptographic algorithm itself.

By means of analogy, if your cryptographic method is to go to a locked room to have a private conversation, then a spy doesn't have to pick the lock if they can still hear you through the door. The locked-room security method itself isn't flawed, but implementing it without a soundproof door has much the same result.

In this case:

The threat resides in the chips’ data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before it’s actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel's 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.

Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information.

So, the encryption the chips use is solid, but some of the hardware employed can still leak data.

[–] where_am_i@sh.itjust.works 5 points 7 months ago

TL;DR branch prediction is unsafe, but what are you gonna do, take a 50% performance hit?

[–] ramble81@lemm.ee 3 points 7 months ago

Thank you. So this isn’t like the TPM key extraction but closer to Spectre… got it.