Physical Security of Smart Cards
Michael Tunstall
University College Cork, Ireland.
Limerick — March 5, 2008
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 1 / 37
Physical Security of Smart Cards Michael Tunstall University - - PowerPoint PPT Presentation
Physical Security of Smart Cards Michael Tunstall University College Cork, Ireland. Limerick March 5, 2008 Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 Limerick 1 / 37 Introduction Outline
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 1 / 37
Introduction
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 2 / 37
Introduction What is a Smart Card?
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 3 / 37
Introduction Why use Smart Cards?
◮ Storage. ◮ Processing (e.g. authentication/ciphering algorithms).
◮ Ease of use. ◮ Onboard key generation. ◮ Cost. Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 4 / 37
Measuring the Power Consumption
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 5 / 37
Measuring the Power Consumption The Experimental Setup
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 6 / 37
Simple Power Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 7 / 37
Simple Power Analysis
◮ Determine information on secret/private keys in some instances. ◮ Reverse engineering of algorithms. ⋆ Attacking an implementation of a cryptographic algorithm will involve
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 8 / 37
Simple Power Analysis Attacking an Algorithm
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 9 / 37
Simple Power Analysis Attacking an Algorithm
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 10 / 37
Simple Power Analysis Reverse Engineering
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 11 / 37
Simple Power Analysis Reverse Engineering
◮ Two initial permutations to reformat the message and key into a format
◮ ByteSub function (a bytewise substitution), MixColumn and key schedule.
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 12 / 37
Differential Power Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 13 / 37
Differential Power Analysis
◮ Differential Power Analysis is often used as a generic term for any treatment
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 14 / 37
Differential Power Analysis
◮ Proportional to the Hamming weight of the data being manipulated
◮ Proportional to the Hamming weight of the data being manipulated
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 15 / 37
Differential Power Analysis Correlation Power Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 16 / 37
Differential Power Analysis Correlation Power Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 17 / 37
Differential Power Analysis Correlation Power Analysis
◮ A trace will also be necessary for each previous state if the device
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 18 / 37
Differential Power Analysis Using the Partial Correlation
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 19 / 37
Differential Power Analysis Case Study: The DES block cipher
◮ Kn is 48-bits. ◮ Reduced to 32-bits after the S-box function. ◮ In hardware the S-box function can be applied to the 48-bits at the
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 20 / 37
Differential Power Analysis Case Study: The DES block cipher
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 21 / 37
Fault Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 22 / 37
Fault Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 23 / 37
Fault Analysis
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 24 / 37
Fault Analysis Case Study: The DES block cipher
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 25 / 37
Fault Analysis Case Study: The DES block cipher
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 26 / 37
Fault Analysis Case Study: The DES block cipher
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 27 / 37
Countermeasures
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 28 / 37
Countermeasures
◮ I.e. the function,
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 29 / 37
Countermeasures
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 30 / 37
Countermeasures
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 31 / 37
Countermeasures
◮ This also prevents some higher-order attacks that attempt to remove
◮ This is a relatively trivial task but can be time consuming. Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 32 / 37
Other Problems
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 33 / 37
Other Problems
◮ French Carte Bleu ◮ COMP128 used in GSM Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 34 / 37
Conclusion
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 35 / 37
Conclusion
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 36 / 37
Conclusion
Michael Tunstall (UCC, Ireland) Physical Security of Smart Cards March 5, 2008 — Limerick 37 / 37