Abstract
Theoretical security of cryptographic systems does not guarantee its security in practice when those systems are implemented in physical devices. In this work we present initial stages of a software tool under development to carry out differential power analysis attacks against smart cards. Once properly configured, the toolbox controls a digital oscilloscope which acquires the power traces during the operation of the device and automatically performs the necessary traces alignment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
NIST: Digital Signature Standard (DSS). National Institute of Standard and Technology, Federal Information Processing Standard Publication, FIPS 186-3 (2009)
Fúster Sabater, A., Hernández Encinas, L., Martín Muñoz, A., Montoya Vitini, F., Muñoz Masqué, J.: Criptografía, protección de datos y aplicaciones. Una guía para estudiantes y profesionales, RA-MA, Madrid, Spain (2012)
Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks. Technical report, Cryptography Research Inc. (1998), http://www.cryptography.com/resources/whitepapers/DPATechInfo.pdf
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kocher, P.C., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptograp. Eng. 1, 5–27 (2011)
Quisquater, J.J., Samyde, D.: A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions, the SEMA and DEMA methods. In: EUROCRYPT 2000 Rump Session (2000)
Quisquater, J.J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)
Quisquater, J.J., Samyde, D.: Eddy current for magnetic analysis with active sensor. In: Proc. of 3rd Conference on Research in SmartCards, E-Smart 2002, Nice, France, pp. 185–194 (2002)
Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)
Skorobogatov, S.: Semi-invasive attacks-A new approach to hardware security analysis. PhD thesis, University of Cambridge, Darwin College. UK (2005), http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.pdf
Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires IX, 1–2, 5–38, 161–191 (1883)
Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: Revealing the secrets of smart cards. Advances in Information Security. Springer Science+Business Media, NY (2007)
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Messerges, T., Dabbish, E., Sloan, R.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(4), 541–552 (2002)
Peeters, E., Standaert, F.-X., Donckers, N., Quisquater, J.-J.: Improved higher-order side-channel attacks with FPGA experiments. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 309–323. Springer, Heidelberg (2005)
Muller, F., Valette, F.: High-order attacks against the exponent splitting protection. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 315–329. Springer, Heidelberg (2006)
Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: Another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112–129. Springer, Heidelberg (2010)
Namolaru, M.: Devirtualization in GCC. In: Proceedings of the GCC Developers’ Summit (2006), http://ols.fedoraproject.org/GCC/Reprints-2006/namolaru-reprint.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Rodríguez, A.F., Encinas, L.H., Muñoz, A.M., Alcázar, B.A. (2014). A Toolbox for DPA Attacks to Smart Cards. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_41
Download citation
DOI: https://doi.org/10.1007/978-3-319-01854-6_41
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01853-9
Online ISBN: 978-3-319-01854-6
eBook Packages: EngineeringEngineering (R0)