Electromagnetic Analysis: Concrete Results

  • Karine Gandolfi
  • Christophe Mourtel
  • Francis Olivier
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2162)


Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual cryptographic algorithms such as des or rsa were successfully attacked.

This work describes electromagnetic experiments conducted on three different cmos chips, featuring different hardware protections and executing a des, an alleged COMP128 and an RSA. In all cases the complete key material was successfully retrieved.


smart cards side channel leakage electromagnetic analysis SEMA DEMA DPA SPA 


  1. 1.
    sepi’88, Primo simposio nazionale su sicurezza elettromagnetica nella protezione dell’informazione, Rome (Italy), 1988.Google Scholar
  2. 2.
    sepi’ 91, Symposium on electromagnetic security for information protection, Rome (Italy), 1991.Google Scholar
  3. 3.
    R. Anderson, M. Kuhn, Tamper Resistance-a Cautionary Note, Proc. of the Second usenix Workshop on Electronic Commerce, usenix Association, 1996.Google Scholar
  4. 4.
    J-S. Coron, P. Kocher, and D. Naccache, Statistics and Secret Leakage, Financial Cryptography 2000 (fc’00), Lecture Notes in Computer Science, Springer-Verlag, To appear.Google Scholar
  5. 5.
    Y. Gao and I. Wolff, A new miniature magnetic field probe for measuring three-dimensional fields in planar high frequency circuits, IEEE Trans. on Microwave Theory and Techniques, vol. 44 no. 6, pp. 911–918, 1996.CrossRefGoogle Scholar
  6. 6.
    H. Handschuh and P. Paillier, Reducing the collision probability of alleged COMP128, In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications (cardis’98), vol. 1820 of Lecture Notes in Computer Science, pp. 380–385, Springer-Verlag, 2000.Google Scholar
  7. 7.
    T. Harada, H. Sasaki and Y. Kami, Investigation on radiated emission characteristics of multilayer printed circuits boards, IEICE Trans. Commun, E80-B, no. 11, pp. 1645–1651, 1997.Google Scholar
  8. 8.
    P. Kocher, J. Jaffe and B. Jun, Differential power analysis, In M. Wiener, editor, Advances in Cryptology-crypto’99, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer-Verlag, 1999. Also available at: Scholar
  9. 9.
    O. Kömmerling and M. Kuhn, Design principles for tamper-resistant smartcard processors, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99), pp. 9–20. usenix Association, 1999.Google Scholar
  10. 10.
    M. Kuhn and R. Anderson, Soft tempest: Hidden data transmission using electromagnetic emanations, In D. Aucsmith, editor, Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 124–142. Springer-Verlag, 1998.CrossRefGoogle Scholar
  11. 11.
    T. Messerges and E. Dabbish, Investigations of power analysis attacks on smartcards, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99). usenix Association, 1999.Google Scholar
  12. 12.
    J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions, the sema and dema methods, Presented at the rump session of eurocrypt’2000.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Karine Gandolfi
    • 1
  • Christophe Mourtel
    • 1
  • Francis Olivier
    • 1
  1. 1.Card Security GroupGemplus Card InternationalGémenosFrance

Personalised recommendations