Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2162))
Included in the following conference series:
7168Accesses
Abstract
Although the possibility of attacking smart-cards by analyzing their electromagnetic power radiation repeatedly appears in research papers, all accessible references evade the essence of reporting conclusive experiments where actual cryptographic algorithms such as des or rsa were successfully attacked.
This work describes electromagnetic experiments conducted on three different cmos chips, featuring different hardware protections and executing a des, an allegedCOMP128 and anRSA. In all cases the complete key material was successfully retrieved.
Chapter PDF
Similar content being viewed by others
References
sepi’88,Primo simposio nazionale su sicurezza elettromagnetica nella protezione dell’informazione, Rome (Italy), 1988.
sepi’ 91,Symposium on electromagnetic security for information protection, Rome (Italy), 1991.
R. Anderson, M. Kuhn,Tamper Resistance-a Cautionary Note, Proc. of the Second usenix Workshop on Electronic Commerce, usenix Association, 1996.
J-S. Coron, P. Kocher, and D. Naccache,Statistics and Secret Leakage, Financial Cryptography 2000 (fc’00), Lecture Notes in Computer Science, Springer-Verlag, To appear.
Y. Gao and I. Wolff,A new miniature magnetic field probe for measuring three-dimensional fields in planar high frequency circuits, IEEE Trans. on Microwave Theory and Techniques, vol. 44 no. 6, pp. 911–918, 1996.
H. Handschuh and P. Paillier,Reducing the collision probability of alleged COMP128, In J.-J. Quisquater and B. Schneier, editors, Smart Card Research and Applications (cardis’98), vol. 1820 of Lecture Notes in Computer Science, pp. 380–385, Springer-Verlag, 2000.
T. Harada, H. Sasaki and Y. Kami,Investigation on radiated emission characteristics of multilayer printed circuits boards, IEICE Trans. Commun, E80-B, no. 11, pp. 1645–1651, 1997.
P. Kocher, J. Jaffe and B. Jun,Differential power analysis, In M. Wiener, editor, Advances in Cryptology-crypto’99, vol. 1666 of Lecture Notes in Computer Science, pp. 388–397, Springer-Verlag, 1999. Also available at:http://www.cryptography.com/dpa/Dpa.pdf.
O. Kömmerling and M. Kuhn,Design principles for tamper-resistant smartcard processors, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99), pp. 9–20. usenix Association, 1999.
M. Kuhn and R. Anderson,Soft tempest: Hidden data transmission using electromagnetic emanations, In D. Aucsmith, editor, Information Hiding, vol. 1525 of Lecture Notes in Computer Science, pp. 124–142. Springer-Verlag, 1998.
T. Messerges and E. Dabbish,Investigations of power analysis attacks on smartcards, In Proc. of the usenix Workshop on Smartcard Technology (Smartcard’99). usenix Association, 1999.
J-J. Quisquater and D. Samyde,A new tool for non-intrusive analysis of smart cards based on electro-magnetic emissions, the semaand demamethods, Presented at the rump session of eurocrypt’2000.
Author information
Authors and Affiliations
Card Security Group, Gemplus Card International, Parc d’Activités de Gémenos B.P. 100, 13881, Gémenos, France
Karine Gandolfi, Christophe Mourtel & Francis Olivier
- Karine Gandolfi
You can also search for this author inPubMed Google Scholar
- Christophe Mourtel
You can also search for this author inPubMed Google Scholar
- Francis Olivier
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
ECE Department, Oregon State University, Corvallis, Oregon, 97331, USA
Çetin K. Koç
Gemplus Card International, 34 rue Guynemer, 92447, Issy les Moulineaux Cedex, France
David Naccache
ECE Department, Worcester Polytechnic Institute, Worcester, MA, 01609, USA
Christof Paar
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gandolfi, K., Mourtel, C., Olivier, F. (2001). Electromagnetic Analysis: Concrete Results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_21
Download citation
Published:
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-42521-2
Online ISBN:978-3-540-44709-2
eBook Packages:Springer Book Archive
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative