Skip to main content

Side Channel Attacks on Smart Cards: Threats & Countermeasures

  • Chapter
  • 109 Accesses

Abstract

Countermeasures against side channel attacks — e.g. power attacks, based on an analysis of the power consumption, or electromagnetic attacks, which are based on the measurement of electromagnetic emanation — play an important role in modern implementations of cryptographic algorithms on Smart Cards or other security tokens. This has led to significant higher efforts in the implementation of cryptographic libraries for these platforms. For getting assurance about the security, at least during two stages of the development process, additional measurements on the hardware platform become necessary. After giving a short introduction, this article outlines some of the current threats and possible countermeasures; another topic is to describe, how this problems influences the development process and the resource consumption of components which are appropriately secured against possible attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Boneh, R. DeMillo, R. Lipton: “On the Importance of Checking Computations”, Advances in Cryptology — Eurocrypt 97, Springer-Verlag, 1997

    Google Scholar 

  2. E. Biham, A. Shamir: “Differential Fault Analysis of Secret Key Cryptosystems”, Advances in Cryptology — Crypto 97, Springer-Verlag, 1997

    Google Scholar 

  3. P. Kocher, J. Jaffe, B. Jun: “Differential Power Analysis”, Advances in Cryptology — Crypto 99, Springer-Verlag 1999

    Google Scholar 

  4. P. Kocher: ‘Timing Attacks on Implementations of DH, RSA, DSS and other Systems, Advances in Cryptology — Crypto 96, Springer-Verlag, 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Friedr. Vieweg & Sohn Verlagsgesellschaft/GWV Fachverlage GmbH,Wiesbaden

About this chapter

Cite this chapter

Krieger, U. (2004). Side Channel Attacks on Smart Cards: Threats & Countermeasures. In: Securing Electronic Business Processes. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84982-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84982-3_8

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05887-6

  • Online ISBN: 978-3-322-84982-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics