Differential Power Analysis as a digital forensic tool T. Souvignet, J. Frinken Forensic Science International Volume 230, Issue 1, Pages 127-136 (July 2013) DOI: 10.1016/j.forsciint.2013.03.040 Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 1 Breakdown of domestic payment fraud by fraud type. (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.) Source: French Observatory for Payment Cards Security. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 2 Evolution of skimming cases and related loss. Source: French Observatory for Payment Cards Security based on data from EAST. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 3 EMV card deployment – march 2012. Source: French Observatory for Payment Cards Security based on data from European Payments Council. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 4 At top, a PIN acquisition board (based on a mp4 recorder) and a card data acquisition board at bottom. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 5 MSR skimmers. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 6 SPA traces. Source: BKA / [12]. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 7 Example of correlation trace (peaks imply high correlation between hypothetical and measured power consumption). Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 8 Front and back of the skimmer board with all electronic components removed. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 9 AES encryption subroutine before/after modification. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 10 BKA analysis board. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 11 Whole communications operated during the card data storage. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 12 Ciphertext stored within the Flash memory. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 13 AES assembly code: SubBytes and ShiftRows done at the same time. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 14 Logic analyser encryption process visualisation. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 15 Waveform examples: left 1 waveform, right waveforms from 100 measurements. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 16 Measurement process results: waveforms from 100 measurements 300 cycles before trigger point. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 17 Measurement and alignment processes results: waveforms from 100 aligned measurements 300 cycles before trigger point. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 18 Correlation coefficient on plaintext traces for 1st AES key byte. Displayed values from 0x00 to 0x03. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 19 Correlation coefficient of SBox output traces for 1st AES key byte value 0xA0 to 0xA3. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Fig. 20 An example of computation ordered guessed key display. Forensic Science International 2013 230, 127-136DOI: (10.1016/j.forsciint.2013.03.040) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions