Skip to main content

Abstract

Theoretical security of cryptographic systems does not guarantee its security in practice when those systems are implemented in physical devices. In this work we present initial stages of a software tool under development to carry out differential power analysis attacks against smart cards. Once properly configured, the toolbox controls a digital oscilloscope which acquires the power traces during the operation of the device and automatically performs the necessary traces alignment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  2. NIST: Digital Signature Standard (DSS). National Institute of Standard and Technology, Federal Information Processing Standard Publication, FIPS 186-3 (2009)

    Google Scholar 

  3. Fúster Sabater, A., Hernández Encinas, L., Martín Muñoz, A., Montoya Vitini, F., Muñoz Masqué, J.: Criptografía, protección de datos y aplicaciones. Una guía para estudiantes y profesionales, RA-MA, Madrid, Spain (2012)

    Google Scholar 

  4. Kocher, P., Jaffe, J., Jun, B.: Introduction to differential power analysis and related attacks. Technical report, Cryptography Research Inc. (1998), http://www.cryptography.com/resources/whitepapers/DPATechInfo.pdf

  5. Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. Kocher, P.C., Jaffe, J., Jun, B., Rohatgi, P.: Introduction to differential power analysis. J. Cryptograp. Eng. 1, 5–27 (2011)

    Article  Google Scholar 

  7. Quisquater, J.J., Samyde, D.: A new tool for non-intrusive analysis of smart cards based on electromagnetic emissions, the SEMA and DEMA methods. In: EUROCRYPT 2000 Rump Session (2000)

    Google Scholar 

  8. Quisquater, J.J., Samyde, D.: ElectroMagnetic Analysis (EMA): Measures and counter-measures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  9. Quisquater, J.J., Samyde, D.: Eddy current for magnetic analysis with active sensor. In: Proc. of 3rd Conference on Research in SmartCards, E-Smart 2002, Nice, France, pp. 185–194 (2002)

    Google Scholar 

  10. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 37–51. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  11. Skorobogatov, S.: Semi-invasive attacks-A new approach to hardware security analysis. PhD thesis, University of Cambridge, Darwin College. UK (2005), http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.pdf

  12. Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires IX, 1–2, 5–38, 161–191 (1883)

    Google Scholar 

  13. Mangard, S., Oswald, E., Popp, T.: Power analysis attacks: Revealing the secrets of smart cards. Advances in Information Security. Springer Science+Business Media, NY (2007)

    Google Scholar 

  14. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  15. Messerges, T., Dabbish, E., Sloan, R.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(4), 541–552 (2002)

    Article  MathSciNet  Google Scholar 

  16. Peeters, E., Standaert, F.-X., Donckers, N., Quisquater, J.-J.: Improved higher-order side-channel attacks with FPGA experiments. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 309–323. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Muller, F., Valette, F.: High-order attacks against the exponent splitting protection. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 315–329. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  18. Standaert, F.-X., Veyrat-Charvillon, N., Oswald, E., Gierlichs, B., Medwed, M., Kasper, M., Mangard, S.: The world is not enough: Another look on second-order DPA. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 112–129. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  19. Namolaru, M.: Devirtualization in GCC. In: Proceedings of the GCC Developers’ Summit (2006), http://ols.fedoraproject.org/GCC/Reprints-2006/namolaru-reprint.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Fuentes Rodríguez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Rodríguez, A.F., Encinas, L.H., Muñoz, A.M., Alcázar, B.A. (2014). A Toolbox for DPA Attacks to Smart Cards. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-01854-6_41

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-01853-9

  • Online ISBN: 978-3-319-01854-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics