Filters








368 Hits in 4.8 sec

On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices [chapter]

Thomas Plos, Michael Hutter, Martin Feldhofer
2009 Lecture Notes in Computer Science  
This article focuses on practical analysis of electromagnetic (EM) side channels and evaluates different preprocessing techniques to increase the attacking performance.  ...  Our experiments prove the applicability of different preprocessing techniques in a practical case study and demonstrate their efficiency on RFID devices.  ...  Side-channel attacks target at the implementation of a cryptographic device.  ... 
doi:10.1007/978-3-642-10838-9_13 fatcat:7mrafgvdzjehteuogvcrdmmcya

EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment [chapter]

Timo Kasper, David Oswald, Christof Paar
2009 Lecture Notes in Computer Science  
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlation power analysis (CPA)  ...  Employing the developed hardware, we present the rst successful key-recovery attack on commercially available contactless smartcards based on the Data Encryption Standard (DES) or Triple-DES (3DES) cipher  ...  RFID Measurement Setup For a typical power analysis attack [8] the side-channel leakage in terms of the electrical current consumption of the device, while executing a cryptographic operation, is measured  ... 
doi:10.1007/978-3-642-10838-9_7 fatcat:2fxij4xbqjb6vevaandy6t5oyq

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation [chapter]

Timo Kasper, David Oswald, Christof Paar
2012 Lecture Notes in Computer Science  
secret keys by exploiting a side-channel, for instance, the electro-magnetic (EM) emanation of an Integrated Circuit (IC).  ...  As most modern cryptographic Radio Frequency Identification (RFID) devices are based on ciphers that are secure from a purely theoretical point of view, e.g., (Triple-)DES or AES, adversaries have been  ...  For SCA of RFID devices, less research has been conducted, especially with respect to attacks on real-world devices.  ... 
doi:10.1007/978-3-642-25286-0_5 fatcat:wmsdu4x4i5frhkofzivotpgl5e

Attacking an AES-Enabled NFC Tag: Implications from Design to a Real-World Scenario [chapter]

Thomas Korak, Thomas Plos, Michael Hutter
2012 Lecture Notes in Computer Science  
This let us come to the conclusion that the effort for attacking contactless devices like RFID tags is only slightly higher than that for contact-based devices.  ...  In this work we present differential power analysis (DPA) and differential electromagnetic analysis (DEMA) attacks on a securityenabled RFID tag.  ...  With this step we show that the different approaches to measure the side-channel information as well as the attacks on the different hardware devices lead to comparable results which is a very important  ... 
doi:10.1007/978-3-642-29912-4_2 fatcat:rok5f4xr7ra6ravbmzhjzqjwaq

Analysis of RFID Application for U-healthcare System in Internet of Things

Jung Tae Kim
2014 International Journal of Smart Home  
Attackers can also threaten the security of systems. It depends on the original characteristics of RFID. The representative attack is the denial of service attack.  ...  In the past years, Internet of Things (IoT) has been focused and fused with wireless sensor node such as RFID, NFC tag and small sensor nodes, especially for hospital environment with mobile device.  ...  An RFID tag's memory is vulnerable to compromise by side channel attacks, because the memory of a low cost tag is unlikely to be tamper-proof.  ... 
doi:10.14257/ijsh.2014.8.6.13 fatcat:kixqngaa4zcftbqopodhpjrucm

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices [chapter]

Timo Kasper, David Oswald, Christof Paar
2010 Lecture Notes in Computer Science  
We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including  ...  The corresponding data acquisition system for side-channel attacks makes precise power and EM analyses possible.  ...  Fig. 1 . 1 Classification of implementation attacks. Fig. 2 . 2 Modules for side-channel analysis of a cryptographic device.  ... 
doi:10.1007/978-3-642-17499-5_5 fatcat:yd7vx5jw5vh2boctlr2z2hjxcm

Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World [chapter]

David Oswald, Christof Paar
2011 Lecture Notes in Computer Science  
In this paper, we demonstrate practical, noninvasive side-channel attacks on the Mifare DESFire MF3ICD40 contactless smartcard, a 3DES-based alternative to the cryptanalytically weak Mifare Classic [9,  ...  With the advent of side-channel analysis, implementations of mathematically secure ciphers face a new threat: by exploiting the physical characteristics of a device, adversaries are able to break algorithms  ...  At CHES 2002, the authors of [5] proposed the use of machine learning techniques such as pattern recognition for Side-Channel Analysis (SCA) and coined the notion of "template attacks".  ... 
doi:10.1007/978-3-642-23951-9_14 fatcat:qcd2bvvh6vgorfaqtoonuspgn4

Analyzing Side-Channel Leakage of RFID-Suitable Lightweight ECC Hardware [chapter]

Erich Wenger, Thomas Korak, Mario Kirschbaum
2013 Lecture Notes in Computer Science  
It is specially important to consider that RFID tags are easily accessible to perform practical side-channel attacks due to their fields of applications.  ...  In this paper, we investigate a practical attack scenario on a randomized ECC hardware implementation suitable for RFID tags.  ...  In this preprocessing step, all the sample points within one clock period of the device were summed up.  ... 
doi:10.1007/978-3-642-41332-2_9 fatcat:5cixu7xikjcvxf4nz6jhlr2gse

IOT Security Threats and Block Chain based Solutions

2019 International journal of recent technology and engineering  
In future IoT is expected to be effortlessly integrated into our environment and human will be solely dependent on this technology for comfort and easy life style.  ...  In future IoT is expected to be effortlessly integrated into our environment and human will be solely dependent on this technology for comfort and easy life style.  ...  The fog device implements operations on the collected data including aggregation, preprocessing, and storage.  ... 
doi:10.35940/ijrte.b1034.0782s519 fatcat:unx6ipmi3zdkjgw6jbeo6fe4vq

Big Data Analytics for Large-scale Wireless Networks

Hong-Ning Dai, Raymond Chi-Wing Wong, Hao Wang, Zibin Zheng, Athanasios V. Vasilakos
2019 ACM Computing Surveys  
The wide proliferation of various wireless communication systems and wireless devices has led to the arrival of big data era in large scale wireless networks.  ...  In particular, we categorize the life cycle of BDA into four consecutive stages: Data Acquisition, Data Preprocessing, Data Storage and Data Analytics.  ...  Hon for his constructive comments.  ... 
doi:10.1145/3337065 fatcat:vjjoymozrzb6pkchdp36dh6lze

Signal Processing for Cryptography and Security Applications [chapter]

Miroslav Knežević, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede
2010 Handbook of Signal Processing Systems  
Regarding the secure implementations we outline the concept of side channel attacks and show how a multitude of techniques for preprocessing the data are used in such scenarios.  ...  Embedded devices need both an efficient and a secure implementation of cryptographic primitives.  ...  One type of side channel attacks, a differential side channel attack, sequences several steps to extract the secret information.  ... 
doi:10.1007/978-1-4419-6345-1_7 fatcat:we7ukic54fa2vfg2zznsxohzbi

Signal Processing for Cryptography and Security Applications [chapter]

Miroslav Knežević, Lejla Batina, Elke De Mulder, Junfeng Fan, Benedikt Gierlichs, Yong Ki Lee, Roel Maes, Ingrid Verbauwhede
2013 Handbook of Signal Processing Systems  
Regarding the secure implementations we outline the concept of side channel attacks and show how a multitude of techniques for preprocessing the data are used in such scenarios.  ...  Embedded devices need both an efficient and a secure implementation of cryptographic primitives.  ...  One type of side channel attacks, a differential side channel attack, sequences several steps to extract the secret information.  ... 
doi:10.1007/978-1-4614-6859-2_7 fatcat:krxcafuknvc5vfxukjza7vow4e

Dismantling DST80-based Immobiliser Systems

Lennert Wouters, Jan Van Den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Finally, even without key management or configuration issues, we demonstrate how an attacker can recover the cryptographic key using a profiled side-channel attack.  ...  We discovered that Kia and Hyundai immobiliser keys have only three bytes of entropy and that Toyota only relies on publicly readable information such as the transponder serial number and three constants  ...  Acknowledgments This work was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058.  ... 
doi:10.13154/tches.v2020.i2.99-127 dblp:journals/tches/WoutersHGOGP20 fatcat:2amg5kgufndcndatf64m3gadpu

Dismantling DST80-based Immobiliser Systems

Lennert Wouters, Jan Van den Herrewegen, Flavio D. Garcia, David Oswald, Benedikt Gierlichs, Bart Preneel
2020 Transactions on Cryptographic Hardware and Embedded Systems  
Finally, even without key management or configuration issues, we demonstrate how an attacker can recover the cryptographic key using a profiled side-channel attack.  ...  We discovered that Kia and Hyundai immobiliser keys have only three bytes of entropy and that Toyota only relies on publicly readable information such as the transponder serial number and three constants  ...  Acknowledgments This work was supported in part by the Research Council KU Leuven C1 on Security and Privacy for Cyber-Physical Systems and the Internet of Things with contract number C16/15/058.  ... 
doi:10.46586/tches.v2020.i2.99-127 fatcat:wncimbgjobagphzu6547urx7gy

A Machine Learning Approach Against a Masked AES [chapter]

Liran Lerman, Stephane Fernandes Medeiros, Gianluca Bontempi, Olivier Markowitch
2014 Lecture Notes in Computer Science  
Side-channel attacks challenge the security of cryptographic devices. One of the widespread countermeasures against these attacks is the masking approach.  ...  This number of traces represents roughly twice the number of traces needed compared to an unmasked AES on the same cryptographic device.  ...  Preliminaries Side-channel attack During the execution of an encryption algorithm, the cryptographic device processes a function f f : M × O → F (1) s = f O (m) (2) called a sensitive variable [25]  ... 
doi:10.1007/978-3-319-08302-5_5 fatcat:qg7gr54j25f4roxxwjazgairdu
« Previous Showing results 1 — 15 out of 368 results