ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart Cards

  • Jean-Jacques Quisquater
  • David Samyde
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2140)

Abstract

A processor can leak information by different ways [1], electromagnetic radiations could be one of them. This idea, was first introduced by Kocher, with timing and power measurements. Here we developed the continuation of his ideas by measuring the field radiated by the processor. Therefore we show that the electromagnetic attack obtains at least the same result as power consumption and consequently must be carefuly taken into account. Finally we enumerate countermeasures to be implemented.

Keywords

electromagnetic and power analysis tamper resistance SEMA DEMA SPA DPA smartcard 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    R. Anderson and M. Kuhn, Tamper resistance-A cautionary note, Proc. of the Second USENIX Workshop on Electronic Commerce, 1996, pp 1–11.Google Scholar
  2. [2]
    P.N. Fahm and P.K. Pearson, IPA: A new class of power attacks, Proc. of CHES’99 (C.K. Koc and Chr. Paar, eds), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 173–186.Google Scholar
  3. [3]
    P. Kocher, J. Jaffe and B. Jun, Differential power analysis, Advances in Cryptology-CRYPTO’99 (M.J. Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 388–397.CrossRefGoogle Scholar
  4. [4]
    Power analysis of the key scheduling of the AES candidates, The Second AES Conference, March 22–23, 1999, pp. 115–121.Google Scholar
  5. [5]
    T.S. Messerges, E.A. Dabbish, R. Sloan, Investigations of Power Analysis Attacks on Smartcards.Google Scholar
  6. [6]
    Low cost attacks on tamper resistant devices, Proc. of International Workshop on Security Protocols 1997 (Paris, France) (M. Lomas et. al, ed.), Lecture Notes in Computer Science, vol. 1361, Springer-Verlag, 1997, pp. 125–136Google Scholar
  7. [7]
    Towards sound approaches to counteract power-analysis attacks, Proc. Of CRYPTO’99 (M.J. Wiener, ed.), Lecture Notes in Computer Science, vol. 1666, Springer-Verlag, 1999, pp. 398–412.Google Scholar
  8. [8]
    J-S. Coron, Resistance against differential power analysis for elliptic curve cryptosystems, Proc. of CHES’99 (C.K. Ko and Chr. Paar, eds), Lecture Notes in Computer Science, vol. 1717, Springer-Verlag, 1999, pp. 292–302.Google Scholar
  9. [9]
    J-S. Coron, P. Kocher, and D. Naccache, Statistics and secret leakage, Financial Cryptography 2000 (FC’00), Lecture Notes in Computer Science, Springer-Verlag.Google Scholar
  10. [10]
    E. Biham and A. Shamir, Differential fault analysis of secret key cryptosystems, Proc. of CRYPTO’97 (Burton S. Kaliski Jr., ed), Lecture Notes in Computer Science, vol. 1294, Springer-Verlag, 1997, pp. 513–525.Google Scholar
  11. [11]
    D. Boneh, R.A. DeMillo, and R.J. Lipton, On the importance of checking cryptographic protocols for faults, Proc. of EUROCRYPT’ 97 (W. Fumy, ed), Lectures Notes in Computer Science, vol. 1233, Springer-Verlag, 1997, pp. 37–51.Google Scholar
  12. [12]
    E. Hess, N. Janssen, B. Meyer, T. Schutze, Information Leakage Attacks against Smart Card Implementations of Crypt0ographic Algorithms and Countermeasures, Proc. of Eurosmart 2000, pp. 55–63.Google Scholar
  13. [13]
    A. Neve, D. Flandre, J-J. Quisquater, Feasibility of Smart Cards in Silicon-On-Insulator (SOI) Technology, Usenix workshop on Smartcard Technology, (Smartcard’99), Usenix Association.Google Scholar
  14. [14]
    O. Kommerling, M. Kuhn, Design Principles for Tamper-Resistant Smartcard Processors Proc. of the USENIX Workshop on Smartcard Technology (Smart-card’99), pp. 9–20. Usenix Association.Google Scholar
  15. [15]
    K.P. Slattery, J.P. Muccioli, T. North, Modeling the radiated Emisssions from Microprocessors and other VLSI Devices, IEEE 2000 International Symposium on Electromagnetic Compatibility.Google Scholar
  16. [16]
    J.P. Muccioli, T. North, K.P. Slattery, Characterization of the RF Emissions from a family of Microprocessors using a lGHz cell, IEEE 1997 International Symposium on Electromagnetic Compatibilty.Google Scholar
  17. [17]
    J.P. Muccioli, M. Catherwood, Characteristics of Near-field Magnetic Radiated Emissions from VLSI Microcontroller Devices, EMC Test and Design, November 1993.Google Scholar
  18. [18]
    A. Agarwal, Raw Computation, Scientific American, August 1999.Google Scholar
  19. [19]
    J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart-cards based on electro-magnetic emssions, the SEMA and DEMA methods, Presented at the rump session of EUROCRYPT’2000.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Jean-Jacques Quisquater
    • 1
  • David Samyde
    • 1
  1. 1.UCL Crypto Group, Laboratoire de microélectronique (DICE)Université catholique de LouvainLouvain-la-NeuveBelgium

Personalised recommendations