Design Principles for Tamper-Resistant Smartcard Processors

نویسندگان

  • Oliver Kömmerling
  • Markus G. Kuhn
چکیده

We describe techniques for extracting protected software and data from smartcard processors. This includes manual microprobing, laser cutting, focused ion-beam manipulation, glitch attacks, and power analysis. Many of these methods have already been used to compromise widely-fielded conditionalaccess systems, and current smartcards offer little protection against them. We give examples of lowcost protection concepts that make such attacks considerably more difficult.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Smartcard Integration with Kerberos V5

We describe our design and implementation of smartcard integration with Kerberos V5. Authentication is among the most important applications for smartcards and is one of the critical requirements for computer security. By augmenting Kerberos V5 with tamper-resistant hardware, we enhance the security of Kerberos V5 and o er a potential \killer application" leading to wider adoption of smartcard ...

متن کامل

Smartcard Integration with Kerberos V5 Smartcard Integration with Kerberos V5

We describe our design and implementation of smartcard integration with Kerberos V5. Authentication is among the most important applications for smartcards and is one of the critical requirements for computer security. By augmenting Kerberos V5 with tamper-resistant hardware, we enhance the security of Kerberos V5 and o er a potential \killer application" leading to wider adoption of smartcard ...

متن کامل

Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol

We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with o...

متن کامل

Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...

متن کامل

Ist-2000-25350 -shaman Deliverable Title Intermediate Specification of Security Modules Date of Delivery Document Reference Est. Person Months Security Public Nature Report

The document D08 is the intermediate report from SHAMAN WP4. The document derives the requirements for a security module (SM) from the SHAMAN scenarios describing secure heterogeneous network access, personal area networks and personal CAs. It contains a reference model which can be used as a basis for the implementation of a SM. Finally the reference model is compared with current implementati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999