Electromagnetic Analysis: Concrete Results (original) (raw)
Abstract
Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual cryptographic algorithms such as des or rsa were successfully attacked.
This work describes electromagnetic experiments conducted on three different cmos chips, featuring different hardware protections and executing a des, an alleged COMP128 and an RSA. In all cases the complete key material was successfully retrieved.
Chapter PDF
Similar content being viewed by others
References
- sepi’88, Primo simposio nazionale su sicurezza elettromagnetica nella protezione dell’informazione, Rome (Italy), 1988.
Google Scholar - sepi’ 91, Symposium on electromagnetic security for information protection, Rome (Italy), 1991.
Google Scholar - R. Anderson, M. Kuhn, Tamper Resistance-a Cautionary Note, Proc. of the Second usenix Workshop on Electronic Commerce, usenix Association, 1996.
Google Scholar - J-S. Coron, P. Kocher, and D. Naccache, Statistics and Secret Leakage, Financial Cryptography 2000 (fc’00), Lecture Notes in Computer Science, Springer-Verlag, To appear.
Google Scholar - Y. Gao and I. Wolff, A new miniature magnetic field probe for measuring three-dimensional fields in planar high frequency circuits, IEEE Trans. on Microwave Theory and Techniques, vol. 44 no. 6, pp. 911–918, 1996.
Article Google Scholar - H. Handschuh and P. Paillier, Reducing the collision probability of alleged COMP128, In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications (cardis’98), vol. 1820 of Lecture Notes in Computer Science, pp. 380–385, Springer-Verlag, 2000.
Google Scholar - T. Harada, H. Sasaki and Y. Kami, Investigation on radiated emission characteristics of multilayer printed circuits boards, IEICE Trans. Commun, E80-B, no. 11, pp. 1645–1651, 1997.
Google Scholar - P. Kocher, J. Jaffe and B. Jun, Differential power analysis, In M. Wiener, editor, Advances in Cryptology-crypto’99, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer-Verlag, 1999. Also available at: http://www.cryptography.com/dpa/Dpa.pdf.
Google Scholar - O. Kömmerling and M. Kuhn, Design principles for tamper-resistant smartcard processors, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99), pp. 9–20. usenix Association, 1999.
Google Scholar - M. Kuhn and R. Anderson, Soft tempest: Hidden data transmission using electromagnetic emanations, In D. Aucsmith, editor, Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 124–142. Springer-Verlag, 1998.
Chapter Google Scholar - T. Messerges and E. Dabbish, Investigations of power analysis attacks on smartcards, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99). usenix Association, 1999.
Google Scholar - J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions, the sema and dema methods, Presented at the rump session of eurocrypt’2000.
Google Scholar
Author information
Authors and Affiliations
- Card Security Group, Gemplus Card International, Parc d’Activités de Gémenos B.P. 100, 13881, Gémenos, France
Karine Gandolfi, Christophe Mourtel & Francis Olivier
Authors
- Karine Gandolfi
- Christophe Mourtel
- Francis Olivier
Editor information
Editors and Affiliations
- ECE Department, Oregon State University, Corvallis, Oregon, 97331, USA
Çetin K. Koç - Gemplus Card International, 34 rue Guynemer, 92447, Issy les Moulineaux Cedex, France
David Naccache - ECE Department, Worcester Polytechnic Institute, Worcester, MA, 01609, USA
Christof Paar
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gandolfi, K., Mourtel, C., Olivier, F. (2001). Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1\_21
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/3-540-44709-1\_21
- Published: 20 September 2001
- Publisher Name: Springer, Berlin, Heidelberg
- Print ISBN: 978-3-540-42521-2
- Online ISBN: 978-3-540-44709-2
- eBook Packages: Springer Book Archive