Scientists have developed a technique that allows to weaken the cryptographic capabilities of Intel Ivy Bridge generation.
According to the study, the developers were able to change the polarity of individual transistors and affect the operation of the random number generator (RNG). The version reduces entropy RNG to 32 bits , resulting in reduced complexity of generated keys so that an attacker could pick them up without any effort. The hardware trojan can not detect test RNG provided by the National Institute of Standards and Technology.
However, the authors of the study note that the nature of the modified CPU is not found. Also, the attacker must have access to either the integrated circuit layouts, before it will go into production. Related Products :
|