Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag
نویسندگان
چکیده
منابع مشابه
Security-enabled NFC Tag with Flexible Architecture Supporting Asymmetric Cryptography
©2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. DOI: http://dx...
متن کاملPUF – Physical Unclonable Functions
from historical banking and telecommunication applications to electronic passports, electronic IDs, anti-counterfeiting devices, smartgrid applications, and more. The security requirements for most of these applications are crucial and evolving. In addition, more and more sophisticated attacks are being developed every day. As a result, design of Smart Card ICs is a growing challenge. This pape...
متن کاملSecure Authentication through a near Field Communication in Asymmetric Cryptography
This paper presents the design and implementation of a complete near-field communication (NFC) tag system that supports highsecurity features. The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56-MHz radio-frequency identification (RFID) front-end, a digital part that includes a tiny (programmable) 8-b microcontroller, a framing logic for...
متن کاملEvaluation of Side-Channel Preprocessing Techniques on Cryptographic-Enabled HF and UHF RFID-Tag Prototypes
Security-enabled RFID tags become more and more important and integrated in our daily life. While the tags implement cryptographic algorithms that are secure in a mathematical sense, their implementation is not and physical side channels leak information about the secrets. This article focuses on the analysis of electromagnetic side channels and evaluates different preprocessing techniques to i...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کامل