Electromagnetic Analysis: Concrete Results (original) (raw)

Abstract

Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual cryptographic algorithms such as des or rsa were successfully attacked.

This work describes electromagnetic experiments conducted on three different cmos chips, featuring different hardware protections and executing a des, an alleged COMP128 and an RSA. In all cases the complete key material was successfully retrieved.

Chapter PDF

Similar content being viewed by others

References

  1. sepi’88, Primo simposio nazionale su sicurezza elettromagnetica nella protezione dell’informazione, Rome (Italy), 1988.
    Google Scholar
  2. sepi’ 91, Symposium on electromagnetic security for information protection, Rome (Italy), 1991.
    Google Scholar
  3. R. Anderson, M. Kuhn, Tamper Resistance-a Cautionary Note, Proc. of the Second usenix Workshop on Electronic Commerce, usenix Association, 1996.
    Google Scholar
  4. J-S. Coron, P. Kocher, and D. Naccache, Statistics and Secret Leakage, Financial Cryptography 2000 (fc’00), Lecture Notes in Computer Science, Springer-Verlag, To appear.
    Google Scholar
  5. Y. Gao and I. Wolff, A new miniature magnetic field probe for measuring three-dimensional fields in planar high frequency circuits, IEEE Trans. on Microwave Theory and Techniques, vol. 44 no. 6, pp. 911–918, 1996.
    Article Google Scholar
  6. H. Handschuh and P. Paillier, Reducing the collision probability of alleged COMP128, In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications (cardis’98), vol. 1820 of Lecture Notes in Computer Science, pp. 380–385, Springer-Verlag, 2000.
    Google Scholar
  7. T. Harada, H. Sasaki and Y. Kami, Investigation on radiated emission characteristics of multilayer printed circuits boards, IEICE Trans. Commun, E80-B, no. 11, pp. 1645–1651, 1997.
    Google Scholar
  8. P. Kocher, J. Jaffe and B. Jun, Differential power analysis, In M. Wiener, editor, Advances in Cryptology-crypto’99, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer-Verlag, 1999. Also available at: http://www.cryptography.com/dpa/Dpa.pdf.
    Google Scholar
  9. O. Kömmerling and M. Kuhn, Design principles for tamper-resistant smartcard processors, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99), pp. 9–20. usenix Association, 1999.
    Google Scholar
  10. M. Kuhn and R. Anderson, Soft tempest: Hidden data transmission using electromagnetic emanations, In D. Aucsmith, editor, Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 124–142. Springer-Verlag, 1998.
    Chapter Google Scholar
  11. T. Messerges and E. Dabbish, Investigations of power analysis attacks on smartcards, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99). usenix Association, 1999.
    Google Scholar
  12. J-J. Quisquater and D. Samyde, A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions, the sema and dema methods, Presented at the rump session of eurocrypt’2000.
    Google Scholar

Download references

Author information

Authors and Affiliations

  1. Card Security Group, Gemplus Card International, Parc d’Activités de Gémenos B.P. 100, 13881, Gémenos, France
    Karine Gandolfi, Christophe Mourtel & Francis Olivier

Authors

  1. Karine Gandolfi
  2. Christophe Mourtel
  3. Francis Olivier

Editor information

Editors and Affiliations

  1. ECE Department, Oregon State University, Corvallis, Oregon, 97331, USA
    Çetin K. Koç
  2. Gemplus Card International, 34 rue Guynemer, 92447, Issy les Moulineaux Cedex, France
    David Naccache
  3. ECE Department, Worcester Polytechnic Institute, Worcester, MA, 01609, USA
    Christof Paar

Rights and permissions

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gandolfi, K., Mourtel, C., Olivier, F. (2001). Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1\_21

Download citation

Keywords

Publish with us