Skip to main content

ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards

  • Conference paper
  • First Online:
Smart Card Programming and Security (E-smart 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2140))

Included in the following conference series:

Abstract

A processor can leak information by different ways [1], electromagnetic radiations could be one of them. This idea, was first introduced by Kocher, with timing and power measurements. Here we developed the continuation of his ideas by measuring the field radiated by the processor. Therefore we show that the electromagnetic attack obtains at least the same result as power consumption and consequently must be carefuly taken into account. Finally we enumerate countermeasures to be implemented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson and M. Kuhn, Tamper resistance-A cautionary note, Proc. of the Second USENIX Workshop on Electronic Commerce, 1996, pp 1–11.

    Google Scholar 

  2. P.N. Fahm and P.K. Pearson, IPA: A new class of power attacks, Proc. of CHES’99 (C.K. Koc and Chr. Paar, eds), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 173–186.

    Google Scholar 

  3. P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology-CRYPTO’99 (M.J. Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 388–397.

    Chapter  Google Scholar 

  4. Power analysis of the key scheduling of the AES candidates, The Second AES Conference, March 22–23, 1999, pp. 115–121.

    Google Scholar 

  5. T.S. Messerges, E.A. Dabbish, R. Sloan, Investigations of Power Analysis Attacks on Smartcards.

    Google Scholar 

  6. Low cost attacks on tamper resistant devices, Proc. of International Workshop on Security Protocols 1997 (Paris, France) (M. Lomas et. al, ed.), Lecture Notes in Computer Science, vol. 1361, Springer-Verlag, 1997, pp. 125–136

    Google Scholar 

  7. Towards sound approaches to counteract power-analysis attacks, Proc. Of CRYPTO’99 (M.J. Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 398–412.

    Google Scholar 

  8. J-S. Coron, Resistance against differential power analysis for elliptic curve cryptosystems, Proc. of CHES’99 (C.K. Ko and Chr. Paar, eds), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 292–302.

    Google Scholar 

  9. J-S. Coron, P. Kocher, and D. Naccache, Statistics and secret leakage, Financial Cryptography 2000 (FC’00), Lecture Notes in Computer Science, Springer-Verlag.

    Google Scholar 

  10. E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Proc. of CRYPTO’97 (Burton S. Kaliski Jr., ed), Lecture Notes in Computer Science, vol. 1294, Springer-Verlag, 1997, pp. 513–525.

    Google Scholar 

  11. D. Boneh, R.A. DeMillo, and R.J. Lipton, On the importance of checking cryptographic protocols for faults, Proc. of EUROCRYPT’ 97 (W. Fumy, ed), Lectures Notes in Computer Science, vol. 1233, Springer-Verlag, 1997, pp. 37–51.

    Google Scholar 

  12. E. Hess, N. Janssen, B. Meyer, T. Schutze, Information Leakage Attacks against Smart Card Implementations of Crypt0ographic Algorithms and Countermeasures, Proc. of Eurosmart 2000, pp. 55–63.

    Google Scholar 

  13. A. Neve, D. Flandre, J-J. Quisquater, Feasibility of Smart Cards in Silicon-On-Insulator (SOI) Technology, Usenix workshop on Smartcard Technology, (Smartcard’99), Usenix Association.

    Google Scholar 

  14. O. Kommerling, M. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors Proc. of the USENIX Workshop on Smartcard Technology (Smart-card’99), pp. 9–20. Usenix Association.

    Google Scholar 

  15. K.P. Slattery, J.P. Muccioli, T. North, Modeling the radiated Emisssions from Microprocessors and other VLSI Devices, IEEE 2000 International Symposium on Electromagnetic Compatibility.

    Google Scholar 

  16. J.P. Muccioli, T. North, K.P. Slattery, Characterization of the RF Emissions from a family of Microprocessors using a lGHz cell, IEEE 1997 International Symposium on Electromagnetic Compatibilty.

    Google Scholar 

  17. J.P. Muccioli, M. Catherwood, Characteristics of Near-field Magnetic Radiated Emissions from VLSI Microcontroller Devices, EMC Test and Design, November 1993.

    Google Scholar 

  18. A. Agarwal, Raw Computation, Scientific American, August 1999.

    Google Scholar 

  19. J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart-cards based on electro-magnetic emssions, the SEMA and DEMA methods, Presented at the rump session of EUROCRYPT’2000.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Quisquater, JJ., Samyde, D. (2001). ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards. In: Attali, I., Jensen, T. (eds) Smart Card Programming and Security. E-smart 2001. Lecture Notes in Computer Science, vol 2140. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45418-7_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-45418-7_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42610-3

  • Online ISBN: 978-3-540-45418-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics