Side-Channel Attack on a Protected RFID Card

被引:13
作者
Xu, Rixin [1 ,2 ]
Zhu, Liehuang [1 ]
Wang, An [1 ,3 ]
Du, Xiaojiang [4 ]
Choo, Kim-Kwang Raymond [5 ,6 ]
Zhang, Guoshuang [7 ]
Gai, Keke [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Chinese Acad Sci, Key Lab Network Assessment Technol, Inst Informat Engn, Beijing 100093, Peoples R China
[4] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[7] Sci & Technol Informat Assurance Lab, Beijing 100072, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Cryptoanalysis; smart card attack; side-channel analysis; power analysis; KEY MANAGEMENT SCHEME;
D O I
10.1109/ACCESS.2018.2870663
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First, a platform is setup to extract the power consumption information from the electromagnetic wave. Based on the findings from the initial analysis, we determine that the card is equipped with a "head and tail protection'' mechanism. Second, a chosen-plaintext power analysis with a complexity of 2(16) is proposed, which is designed to recover the second round key from the power leakage in the third round. Then, a slicing-collision-algebraic attack is presented, which decreases the complexity to 2(6) rapidly. The experiments show that after collecting 2 0000 power traces (in approximately 200 s), only 2(6) x 8 key guesses and another 177 searches (about 300 seconds) are sufficient in recovering the 56-bit source keys of DES successfully. In other words, we demonstrate how the security of the 3DES card can be easily compromised, using side-channel attacks. Finally, we recommend that the head and tail protection should extend to the first and last four rounds, at the minimal, in order to be side-channel attack resilience.
引用
收藏
页码:58395 / 58404
页数:10
相关论文
共 25 条
  • [1] [Anonymous], 2005, P ECRYPT WORKSH RFID
  • [2] Batina L, 2009, LECT NOTES COMPUT SC, V5747, P112
  • [3] Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
    Belgarric, Pierre
    Fouque, Pierre-Alain
    Macario-Rat, Gilles
    Tibouchi, Mehdi
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2016, 2016, 9610 : 236 - 252
  • [4] Correlation power analysis with a leakage model
    Brier, E
    Clavier, C
    Olivier, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 16 - 29
  • [5] A lightweight live memory forensic approach based on hardware virtualization
    Cheng, Yingxin
    Fu, Xiao
    Du, Xiaojiang
    Luo, Bin
    Guizani, Mohsen
    [J]. INFORMATION SCIENCES, 2017, 379 : 23 - 41
  • [6] Chenyang Tu, 2017, Applied Cryptography and Network Security. 15th International Conference, ACNS 2017. Proceedings: LNCS 10355, P415, DOI 10.1007/978-3-319-61204-1_21
  • [7] An effective key management scheme for heterogeneous sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hslao-Hwa
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 24 - 34
  • [8] A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Guizani, Mohsen
    Xiao, Yang
    Chen, Hsiao-Hwa
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1223 - 1229
  • [9] Wirelessly Pickpocketing a Mifare Classic Card
    Garcia, Flavio D.
    van Rossum, Peter
    Verdult, Roel
    Schreur, Ronny Wichers
    [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 3 - 15
  • [10] ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
    Genkin, Daniel
    Pachmanov, Lev
    Pipman, Itamar
    Tromer, Eran
    Yarom, Yuval
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1626 - 1638