Low Cost Attacks on Smart Cards The Electromagnetic Side-Channel

نویسنده

  • Adam Matthews
چکیده

This paper documents a successful Electromagnetic Analysis attack implemented using limited technical knowledge and low cost equipment. EM traces were acquired from a sample card and analysis software successfully identified the correct key guesses in proprietary traces. It is important to note that although this attack was implemented on a smart card running the DES encryption algorithm, that the same kind of attack is possible on other cards, as long as the implementation details of the algorithm are known. Acknowledgements: Dr. Keith Mayes, Will G. Sirrett, Lishoy Francis, Mike Tunstall, Dr. John Walker, ISG Smart Card Centre http://www.scc.rhul.ac.uk.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

One-Trial Electromagnetic Attack on Modular Exponentiation

Correlative side-channel attack based on ensembles of test sequences is developed. For conducted and radiated electromagnetic analysis the maximal eavesdrop distance is estimated. By a low-cost measurement system developed for noninvasive monitoring of smart cards power consumption an attack on modular exponentiation, based on one power trace only, is realized.

متن کامل

Side - Channel Monitoring of Contactless Java Cards

Smart cards are small, portable, tamper-resistant computers used in securitysensitive applications ranging from identi_cation and access control to payment systems. Side-channel attacks, which use clues from timing, power consumption, or even electromagnetic (EM) signals, can compromise the security of these devices and have been an active research area since 1996. Newer contactless” cards comm...

متن کامل

A New Approach For The Design Of Low Power Dynamic Differential Logic For Secure Integrated Circuits

SMART cards are small integrated circuits (ICs) embedded onto plastic or tokens, and are used for authentication, identification, and personal data storage. They are used by the military, in automatic teller machines, mobile phone subscriber identity module cards, by schools for tracking class attendance, and storing certificates for use in secure web browsing. They are also used internationall...

متن کامل

Towards a Flexible, Opensource BOard for Side-channel analysis (FOBOS)

Side-channel analysis (SCA) attacks pose a growing threat to implementations of cryptographic algorithms implemented in software as well as in hardware. Current standard side-channel evaluation boards with Field Programmable Gate Arrays (FPGAs), that allow for exploring the vulnerability of cryptographic implementations on FPGAs, are expensive and available only for a few FPGA devices. Furtherm...

متن کامل

Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results

RSA is a well-known algorithm that is used in various cryptographic systems like smart cards and e-commerce applications. This article presents practical attacks on implementations of RSA that use the Chinese Remainder Theorem (CRT). The attacks have been performed by inducing faults into a cryptographic device through optical and electromagnetic injections. We show optical attacks using fibre-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006