Skip to main content
Log in

Seitenkanalanalyse kontaktloser SmartCards

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Zusammenfassung

Berührungslose RFID-Technologie wird weltweit für verschiedenste sicherheitsrelevante Anwendungen wie den Identitätsnachweis oder Bezahlvorgänge eingesetzt. Nach der Aufdeckung von Schwachstellen im kryptografischen Schutz der „ersten Generation“ kontaktloser SmartCards hoffte man auf die mit sicheren Chiffren versehenen Nachfolger. Der Beitrag zeigt die Anfälligkeit kontaktloser SmartCards für Seitenkanalangriffe am Beispiel der Mifare DESFire MF3ICD40.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. Bundesamt für Sicherheit in der Informationstechnik. Messung der Abstrahleigenschaften von RFID-Systemen, Version 2.05. Technical report, 2008. https://www.bsi.bund.de/ContentBSI/Themen/Elekausweise/rfid/MarsStudie/marsstudie.html

  2. Bundesamt für Sicherheit in der Informationstechnik. TR-03110 Advanced Security Mechanisms for Machine Readable Travel Documents. Technical Guideline TR-03110, V. 2.05 https://www.bsi.bund.de/DE/Themen/ElektronischeAusweise/elektronischeausweise_node.html

  3. Nicolas Courtois. The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. In SECRYPT, pages 331–338. INSTICC, 2009.

  4. T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. T. M. Shalmani. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme. In CRYPTO 2008, volume 5157 of LNCS, pages 203–220. Springer.

  5. Klaus Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley and Sons, 2nd edition, 2003.

  6. Gerhard P. Hancke. Practical Attacks on Proximity Identification Systems (Short Paper). In IEEE Symposium on Security and Privacy 2006. http://www.cl.cam.ac.uk/~gh275/SPPractical.pdf

  7. International Organization for Standardization (ISO). ISO/IEC 14443: Identification Cards — Contactless Integrated Circuit(s) Cards — Proximity Cards — Part 1–4, 2001. www.iso.ch

  8. P. Kocher, J. Jaffe, and B. Jun. Differential Power Analysis. In CRYPTO 99, volume 1666 of LNCS, pages 388–397. Springer, 1999.

    Chapter  Google Scholar 

  9. Timo Kasper, David Oswald, and Christof Paar. A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices. Volume 10 of Transactions on Computational Science, LNCS 6340, pages 100–130. Springer, 2010.

  10. Timo Kasper, Michael Silbermann, and Christof Paar. All You Can Eat or Breaking a Real-World Contactless Payment System. In Financial Cryptography 2010, volume 6052 of Lecture Notes in Computer Science, pages 343–350. Springer.

  11. Karsten Nohl, David Evans, Starbug, and Henryk Plötz. Reverse-Engineering a Cryptographic RFID Tag. In USENIX Security Symposium, pages 185–194, 2008.

  12. Karsten Nohl, Henryk Plötz, and Andreas Rohr. Establishing Security Best Practices in Access Control. 2011. http://www.srlabs.de/pub/acs

  13. National Security Agency (NSA) TEMPEST: A Signal Problem. Declassified September 2007 http://www.nsa.gov/public_info/_files/cryptologic_spectrum/tempest.pdf

  14. David Oswald and Christof Paar. Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World. In CHES 2011, to appear.

  15. Henrik Plötz and Karsten Nohl. Legic Prime: Obscurity in Depth. 2009. http://events.ccc.de/congress/2009/Fahrplan/attachments/1506_legic-slides.pdf

  16. Adi Shamir and Eran Tromer. Acoustic cryptanalysis: On nosy people and noisy machines. http://cs.tau.ac.il/~tromer/acoustic/

Download references

Authors

Additional information

Dipl.-Ing. Timo Kasper Wiss. Mitarbeiter am Lehrstuhl für Embedded Security Ruhr-Universität Bochum (HGI)

Dipl.-Ing. David Oswald Wiss. Mitarbeiter am Lehrstuhl für Embedded Security, Ruhr-Universität Bochum (HGI)

Prof. Dr.-Ing. Christof Paar Inhaber des Lehrstuhls für Embedded Security, Ruhr-Universität Bochum (HGI)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kasper, T., Oswald, D. & Paar, C. Seitenkanalanalyse kontaktloser SmartCards. DuD 35, 786–790 (2011). https://doi.org/10.1007/s11623-011-0186-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-011-0186-8

Navigation