9,010 Hits in 5.7 sec

Key recovery against 3DES in CPU smart card based on improved correlation power analysis

Yanting Ren, Liji Wu, Hexin Li, Xiangyu Li, Xiangmin Zhang, An Wang, Hongyi Chen
2016 Tsinghua Science and Technology  
Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware  ...  module in a real-life 32-bit CPU smart card.  ...  Using a power analysis system in our laboratory, we mount successful attacks on the 3DES in a real-life 32-bit CPU smart card.  ... 
doi:10.1109/tst.2016.7442503 fatcat:xlmygjcvavbyxf4lt6jjd2hioi

Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards

Jaedeok Ji, Dong-Guk Han, Seokwon Jung, Sangjin Lee, Jongsub Moon
2014 International Journal of Distributed Sensor Networks  
We also made a convenient and low-cost EMD reader board that performs side-channel attacks on contactless smart cards.  ...  In order to demonstrate that EMDs can become another information-leakage side channel, we have carried out side-channel analysis on a commercial contactless smart card that performs 128-bit ARIA encryptions  ...  Attacks on Dual-Type Smart Cards with the S/W ARIA Implementation We performed power and EMD side-channel analyses on a commercial dual-type smart card by using the Correlation Power Analysis (CPA) method  ... 
doi:10.1155/2014/142610 fatcat:sd7gc22d4fe45k2j3kyyur2hp4

A Wireless Covert Channel on Smart Cards (Short Paper) [chapter]

Geir Olav Dyrkolbotn, Einar Snekkenes
2006 Lecture Notes in Computer Science  
WCCA exploits subversive code hidden on all cards during manufacture, to launch an attack, without physical access, when infected cards are used.  ...  Experiments on modern smart cards confirm that an insider with the opportunity to hide subversive code can potentially broadcast the card's internal secrets to a nearby receiver.  ...  We would like to thank Arne Wold, at Gjovik University College, for helpful discussion and guidance related to the analysis of the results.  ... 
doi:10.1007/11935308_18 fatcat:jylo4cuxirhzrckl6auo3vdnda

Attacking smart card systems: Theory and practice

Konstantinos Markantonakis, Michael Tunstall, Gerhard Hancke, Ioannis Askoxylakis, Keith Mayes
2009 Information Security Technical Report  
Keywords: Smart card Security Smart card attacks Relay attacks EMV Satellite TV Contactless a b s t r a c t Smart card technology has evolved over the last few years following notable improvements in the  ...  We also provide examples of well-documented attacks on systems that use smart card technology (e.g. satellite TV, EMV, proximity identification) in an attempt to highlight the importance of the security  ...  Attacks on systems that use smart card technology In this section we present three examples of systems that use smart card technology in order to enhance their product offerings, and, at the same time,  ... 
doi:10.1016/j.istr.2009.06.001 fatcat:zzzvaxpadzabjgrfzcm5migfwq

Power Analysis of FPGAs: How Practical Is the Attack? [chapter]

François-Xavier Standaert, Loïc van Oldeneel tot Oldenzeel, David Samyde, Jean-Jacques Quisquater
2003 Lecture Notes in Computer Science  
Side-channel attacks based on time, power and electromagnetic measurements were successfully applied to the smart card technology, but we have no knowledge of any attempt to implement them against FPGAs  ...  We propose first experimental results against FPGA-implementations of cryptographic algorithms in order to confirm that power analysis has to be considered as a serious threat for FPGA security.  ...  that make the practical implementation of power analysis significantly harder than in the smart card context.  ... 
doi:10.1007/978-3-540-45234-8_68 fatcat:4kdxb6r6jrhj7lmcx3zsva2vdq

Research on the Development of China's Financial IC Card Chips

Jiefu Zhu
2019 Journal of Physics, Conference Series  
Based on the analysis and introduction of mainstream international and national commercial cipher algorithm it studies the attacking modes and principles of power and electromagnetic analysis attacks and  ...  side-channel attack technologies faced by China's IC card chips, and finally summarizes main protection technologies against various attacks.  ...  Normal Attacking Modes and Main Prevention Techniques Power Analysis Attacks Due to its limited resources, financial IC card chips involve contradictions between efficiency and security when implementing  ... 
doi:10.1088/1742-6596/1168/3/032129 fatcat:ibjvudbnrfcdjhvyaalan2txx4

Synchronous Real-time Sampling Technique for Side-channel Analysis Against Randomly Varying Clock-based Countermeasures

Hyemin Yang, Eun-gu Jung, Changkyun Kim
2021 IEEE Access  
INDEX TERMS Alignment, power analysis attack, randomly varying clock, side-channel analysis, smart card, synchronous real-time sampling.  ...  The target of the power analysis attack is an Advanced Encryption Standard (AES)-128 software-implemented smart card operated at 20 MHz, which is varied in the range of 30% by the RVC countermeasure.  ...  The target for the power analysis attack was the AES-128 software-implemented smart card that applied the countermeasure with a RVC operated within a 30% bandwidth with respect to a 20 MHz operating frequency  ... 
doi:10.1109/access.2021.3103183 fatcat:un2zp7tg5zfljmjosmxboy5cuy

Power Analysis, What Is Now Possible.. [chapter]

Mehdi-Laurent Akkar, Régis Bevan, Paul Dischamp, Didier Moyart
2000 Lecture Notes in Computer Science  
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention.  ...  Finally we apply these ideas to set up real attacks on cryptographic algorithms or enhance existing ones.  ...  In the attack on smart-cards based on power-analysis, the situation is quite different: we assume the attacker has access to more than this, namely, see (within a certain limit) what is done during the  ... 
doi:10.1007/3-540-44448-3_38 fatcat:fa2atgjqbnhavberkq23xsleqa

Efficient DPA Attacks on AES Hardware Implementations

Yu HAN, Xuecheng ZOU, Zhenglin LIU, Yicheng CHEN
2008 International Journal of Communications, Network and System Sciences  
This paper presents an effective way to enhance power analysis attacks on AES hardware implementations. The proposed attack adopts hamming difference of intermediate results as power mode.  ...  Various power attacks are conducted on our AES hardware implementation.  ...  Related Work One of the most typical targets of power analysis attacks is the smart card, which is capable of performing secure computations.  ... 
doi:10.4236/ijcns.2008.11010 fatcat:v7njqrj43rgmtocx2bv57gkuea

A high-performance elliptic curve cryptographic coprocessor with side channel analysis countermeasures for smart IC card

Xiaowei Han, Beibei Wang, Liji Wu, An Wang
2015 IEICE Electronics Express  
The proposed coprocessor outperforms other coprocessors in terms of the overall performance of area, power, speed and security, which is quite suitable for smart IC card.  ...  The proposed coprocessor can resist side channel analysis and is implemented basing on the C*Core-C0 platform.  ...  In 1996, Kocher [1] proposed the concept of timing attack. Then he proposed power analysis for smart IC card [2] .  ... 
doi:10.1587/elex.12.20150470 fatcat:2iic7hv3vzh3vg2zb2gcaw4nnq

Power Analysis of Atmel CryptoMemory – Recovering Keys from Secure EEPROMs [chapter]

Josep Balasch, Benedikt Gierlichs, Roel Verdult, Lejla Batina, Ingrid Verbauwhede
2012 Lecture Notes in Computer Science  
We developed a successful power analysis attack on the authentication step of CryptoMemory devices.  ...  To our knowledge, this is the first power analysis attack on Atmel CryptoMemory products reported in the literature.  ...  We focus on power analysis attacks as they are often more practical.  ... 
doi:10.1007/978-3-642-27954-6_2 fatcat:4mhzt7qmc5aoxnbw2vlnq66chy

An Enhanced Remote User Authentication Scheme

Xiaohui Yang, Xinchun Cui, Zhenliang Cao, Ziqiang Hu
2014 Engineering  
Mutual authentication is performed using a challenge-response handshake between user and server, and it avoids the problems of synchronism between smart card and the remote server.  ...  Finally, the security analysis and performance evaluation show that the scheme can resist several attacks, and our proposal is feasible in terms of computation cost and communication cost.  ...  Hence, our scheme is secure against the off-line password guessing attack. Stolen Smart Card Attack Our scheme can prevent stolen smart card attack.  ... 
doi:10.4236/eng.2014.66030 fatcat:tcnlquxi3rcwjeismjk3vqqfru

Utilizing random noise in cryptography

Hui Geng, Jun Wu, Jianming Liu, Minsu Choi, Yiyu Shi
2012 Proceedings of the International Conference on Computer-Aided Design - ICCAD '12  
In this paper, we evaluate this approach, along with the expanded feature of spatial randomness, to resist Correlation Power Analysis (CPA).  ...  Thus, attackers can still aggregate the small deviations between the power traces to identify the correct key.  ...  Correlation Power Analysis Correlation Power Analysis (CPA) is a more effective attacking method compared with DPA [19] .  ... 
doi:10.1145/2429384.2429415 dblp:conf/iccad/GengWLCS12 fatcat:a7zlz3oehrb2np763l6b4d4zky

"On-Card" User Authentication for Contactless Smart Cards based on Gesture Recognition

Markus Ullmann, Ralph Breithaupt, Frank Gehring
2012 Sicherheit  
Smart cards are widely used for security purposes. To protect smart cards against misuse an authentication process (e.g. entering apin or password) is necessary.  ...  This offers new"on-card" authentication, card configuration and even front end interface capabilities.  ...  Here, we observeonly an external attacker.So, invasive attacks of smart cards are excluded as well as side channel analysis of the number insertion on the capacitive sensor element.  ... 
dblp:conf/sicherheit/UllmannBG12 fatcat:kcsqlk736bcjzeex5yaupus23e

Electromagnetic Analysis: Concrete Results [chapter]

Karine Gandolfi, Christophe Mourtel, Francis Olivier
2001 Lecture Notes in Computer Science  
Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive  ...  experiments where actual cryptographic algorithms such as des or rsa were successfully attacked.  ...  Modular exponentiation The third experiment concerned an rsa exponentiation performed in a decapsulated smart card.  ... 
doi:10.1007/3-540-44709-1_21 fatcat:3k3ihoy4onfipnob4bci3lrowu
« Previous Showing results 1 — 15 out of 9,010 results