Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, 05.02.2010 BCRYPT.

Slides:



Advertisements
Similar presentations
IEEE ExpertNow RFID Sequence Kapil R. Dandekar, Ph.D. 15/Nov/2008 New Brunswick, IEEE Meeting Series.
Advertisements

Toward Practical Public Key Anti- Counterfeiting for Low-Cost EPC Tags Alex Arbit, Avishai Wool, Yossi Oren, IEEE RFID April
Smart Card security analysis Smart Card security analysis Marc Witteman, TNO.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
RFID Group Progress Leader: Muhammad Salman Younas Team: Jawad Khalil Sheikh Saad Al-Shaalan Muhammad Al-Khamees.
Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
Time Cost Evaluation for Executing RFID Authentication Protocols Yingjiu Li, Ph.D. Associate Professor School of Information Systems Singapore Management.
SIMS: Smart Inventory Management System Group 37 Masaki Negishi & Anthony Fai ECE 445 Senior Design April 27, 2005.
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI Institute for Applied Information.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Yossef Oren, Dvir Schirman, and Avishai Wool: Tel Aviv University ESORICS 2013.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Anti-counterfeiting via Federated RFID Tags’ Diversities Lei Yang Tsinghua University Pai Peng, Fan Dang, Xiang-Yang Li, Yunhao Liu.
ITEC 810 Overview of Micropayment Technology
Strong Error Detection for Control Units Against Advanced Attackers Kahraman Daglar Akdemir Advisor: Berk Sunar Electrical and Computer Engineering MOTIVATION.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
E-Passports Threatens Your Privacy Nathan Sweet CSCE 390 Dr. Valtorta
High Level Design the gEEk squad Michael Cozzolino Elizabeth Reed Andrew Williams Colleen O’Hagan.
April 3-7, 2005, Honolulu, HI 2005 IEEE/ACES Int'l Conference on Wireless Communications and Applied Computational Electromagnetics 1 Amplifier-Based Active.
RFID Technology RFID stands for radio frequency identification. This technology allows transmission of data between a transponder and a reader on a contactless.
Radio-Triggered Wake-Up Capability for Sensor Networks Soji Sajuyigbe Duke University Slides adapted from: Wireless Sensor Networks Power Management Prof.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
The physics of RFID Matt Reynolds Founding Partner ThingMagic LLC.
SIMS: Smart Inventory Management System Group 37 Masaki Negishi & Anthony Fai ECE 445 Senior Design April 27, 2005.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
RFID and Wine Alfio Grasso Deputy Director Auto-ID Lab, ADELAIDE.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Be careful, a spy is following you!. 2 Outline – Overview Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints.
Issues in Integrated Circuit Design for UHF RFID Zhihua WANG,Xuguang SUN, Chun ZHANG,Yongming LI Institute of Microelectronics, Tsinghua University,Beijing,100084,P.R.China.
Novel Sensing Networks for Intelligent Monitoring (Newton) Z Q Lang, H Chen, T Dodd Department of Automatic Control & Systems Engineering University of.
IT R&D Global Leader 1 Ubiquitous IT Europe Forum 2008 Security Technologies in USN Dooho Choi Information Security Research Division.
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
Centro de Electrónica Industrial (CEI) | Universidad Politécnica de Madrid | | Side Channel Attack (SCA) is a special attak method.
Practical Attacks on a Proximity Card Jonathan Westhues June
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
Low-Cost Untraceable Authentication Protocols for RFID Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede BCRYPT workshop on RFID Security February.
Sandrine AGAGLIATE, FTFC Power Consumption Analysis and Cryptography S. Agagliate Canal+Technologies P. Guillot Canal+Technologies O. Orcières Thalès.
USER IDENTIFICATION SYSTEM.
Overall: 9/10. GOODWORK ON  Good information  Very detailed  Nice Introduction  RFID has many similarities with barcoding but with the unique characteristics.
Radio Frequency Identification
Saeed Ur Rehman Supervised by AP Kevin Sowerby Colin Coghill.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
Presenter: Hao Xu Computer Science The College of William & Mary
Hoda Jannati School of Computer Science
Using Memory to Cope with Simultaneous Transient Faults Authors: Universidade Federal do Rio Grande do Sul Programa de Pós-Graduação em Engenharia Elétrica.
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Telematics, Smartphones and the security threats they pose when integrated with Automobiles Carl Jaeger COSC 4765.
ECEn 191 – New Student Seminar - Session 2: Communications ECEn 191 – New Student Seminar – Session 2: Electromagnetic Transmission Electromagnetic Transmission.
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
Автоматизация деятельности библиотек на основе радиочастотной идентификации Качина Наталия Ивановна Директор Департамента по работе с библиотеками и вузами.
Smart Parking System (SPS) Prepared by: Ma’ali Hasan. Noora Dmedi.
Teng Wei and Xinyu Zhang
3506-D WEST LAKE CENTER DRIVE,
NSG 4070 Signal generator and immunity test system Dr. Heinrich
Advanced Information Security 6 Side Channel Attacks
Basic MOS Amplifiers: DC and Low Frequency Behavior
Extending the Range of eZ430-TMS37157 PaLFI
Chapter 15 - Principles and Techniques of RFID Positioning
Security Implementation Using Present-Puffin Protocol
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, BCRYPT Workshop Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology Side-Channel and Fault Attacks on RFID Michael Hutter BCRYPT RFID Security Workshop 2010

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 2 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Presentation Outline  Side Channel Analysis on RFID  Measurement Setups  Attacks  Results  Fault Attacks on RFID  Measurement Setups  Attacks  Results  Conclusions

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 3 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop A typical SCA Setup…

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 4 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop SCA on RFID ?  No resistor  No trigger  Low power  Strong reader field

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 5 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Practical Solutions  …electromagnetic measurements  Trigger on RFID communication  Use analog amplifiers  Apply pre-processing techniques  Apply reader-signal cancelation techniques

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 6 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques  Frequency Selective Measurements Picture R&S®

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 7 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques  Frequency Selective Measurements  Helmholtz Arrangement Picture R&S®

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 8 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques  Frequency Selective Measurements  Helmholtz Arrangement  Phase-Shifted Signal Subtraction Picture R&S® Shift xº

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 9 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Another Solution… …Contact-based Power Analysis

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 10 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop SCA Results ISO C Gen2 UHF tagISO HF tag

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 11 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Interesting Observation…  The power consumption raises earlier for certain input values…  …because many RFID tags process data serially  This can be exploited in timing attacks

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 12 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop How to perform Fault Attacks on RFID?

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 13 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions  EM Fault Injections

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 14 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions  EM Fault Injections  Antenna Tearing

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 15 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions  EM Fault Injections  Antenna Tearing  Optical Inductions

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 16 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Another Solution… …Contact-based Fault Injection Setup

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 17 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop sweep

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 18 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Fault Analysis Results  Faults cause the tags to write faulty values into the memory  The value can be influenced by the adversary  Optical Fault Inductions allow unnoticed writing of faulty values

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 19 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Conclusion  EM as well as power-analysis attacks pose a serious threat in security-enabled RFID applications  Fault attacks can be used to write faulty values into the tag’s memory without detection

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 20 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Michael Hutter IAIK – Graz University of Technology Side-Channel and Fault Attacks on RFID