A template attack against Verify PIN algorithms
Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet and Ronan Lashermes July 27th 2016
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 1/23
A template attack against Verify PIN algorithms Hlne Le Bouder, - - PowerPoint PPT Presentation
A template attack against Verify PIN algorithms Hlne Le Bouder, Thierno Barry, Damien Courouss, Jean-Louis Lanet and Ronan Lashermes July 27th 2016 A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 1/23
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 1/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 2/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 2/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 3/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 4/23
Introduction Verify PIN algorithm Attack Results Conclusion
1: procedure VERIFY PIN(candidate PIN V) 2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17: end procedure
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 5/23
Introduction Verify PIN algorithm Attack Results Conclusion
1: procedure COMPARISON(candidate PIN V, true PIN U) 2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18: end procedure
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 6/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 7/23
Introduction Verify PIN algorithm Attack Results Conclusion
1 profiling phase, 2 attack phase.
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 8/23
Introduction Verify PIN algorithm Attack Results Conclusion Profiling phase
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 9/23
Introduction Verify PIN algorithm Attack Results Conclusion Profiling phase
for time. A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 10/23
Introduction Verify PIN algorithm Attack Results Conclusion Profiling phase
for time.
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 10/23
Introduction Verify PIN algorithm Attack Results Conclusion Profiling phase
for time.
sk(j,j′) =
1 n−1 ·
t xkj′ − xkj′
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 10/23
Introduction Verify PIN algorithm Attack Results Conclusion Attack phase
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 11/23
Introduction Verify PIN algorithm Attack Results Conclusion Attack phase
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 12/23
Introduction Verify PIN algorithm Attack Results Conclusion Attack phase
Fv
1
2 ·
v,k ·
t . A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 12/23
Introduction Verify PIN algorithm Attack Results Conclusion Attack phase
Fv
1
2 ·
v,k ·
t .
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 12/23
Introduction Verify PIN algorithm Attack Results Conclusion Test bench
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 13/23
Introduction Verify PIN algorithm Attack Results Conclusion Test bench
Picoscope Probe EM Probe Target Device UART Control computer
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 14/23
Introduction Verify PIN algorithm Attack Results Conclusion General results
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 15/23
Introduction Verify PIN algorithm Attack Results Conclusion General results
0.2 0.4 0.6 0.8 F0(T,k) 2 4 6 8 guesses k
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 16/23
Introduction Verify PIN algorithm Attack Results Conclusion General results
0.02 0.04 0.06 0.08 0.1 F0(T,k) 2 4 6 8 guesses k 0.1106 0.1108 0.111 0.1112 0.1114 0.1116 0.1118 F0(T,k) 2 4 6 8 guesses k
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 17/23
Introduction Verify PIN algorithm Attack Results Conclusion Final attack
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 18/23
Introduction Verify PIN algorithm Attack Results Conclusion Final attack 1: procedure ATTACK(C the number of trials in the VERFY PIN) 2:
3:
4:
5:
k∈K (Fv(Tv,k)) // ˆ
6:
7:
8:
9:
10:
k∈K (Fv(Tv,k)). 11:
12:
13: end procedure
1 Send candidate PIN with all bytes to 0. 2 Then test the PIN code returned by the first attack.
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 19/23
Introduction Verify PIN algorithm Attack Results Conclusion Final attack
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 20/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 21/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 22/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 22/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 22/23
Introduction Verify PIN algorithm Attack Results Conclusion
A template attack against Verify PIN algorithms Le Bouder et al. July 27th 2016 23/23