Presentation is loading. Please wait.

Presentation is loading. Please wait.

Differential Power Analysis as a digital forensic tool

Similar presentations


Presentation on theme: "Differential Power Analysis as a digital forensic tool"— Presentation transcript:

1 Differential Power Analysis as a digital forensic tool
T. Souvignet, J. Frinken  Forensic Science International  Volume 230, Issue 1, Pages (July 2013) DOI: /j.forsciint Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

2 Fig. 1 Breakdown of domestic payment fraud by fraud type. (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.) Source: French Observatory for Payment Cards Security. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

3 Fig. 2 Evolution of skimming cases and related loss.
Source: French Observatory for Payment Cards Security based on data from EAST. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

4 Fig. 3 EMV card deployment – march 2012.
Source: French Observatory for Payment Cards Security based on data from European Payments Council. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

5 Fig. 4 At top, a PIN acquisition board (based on a mp4 recorder) and a card data acquisition board at bottom. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

6 Fig. 5 MSR skimmers. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

7 Fig. 6 SPA traces. Source: BKA / [12].
Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

8 Fig. 7 Example of correlation trace (peaks imply high correlation between hypothetical and measured power consumption). Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

9 Fig. 8 Front and back of the skimmer board with all electronic components removed. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

10 Fig. 9 AES encryption subroutine before/after modification.
Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

11 Fig. 10 BKA analysis board. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

12 Fig. 11 Whole communications operated during the card data storage.
Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

13 Fig. 12 Ciphertext stored within the Flash memory.
Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

14 Fig. 13 AES assembly code: SubBytes and ShiftRows done at the same time. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

15 Fig. 14 Logic analyser encryption process visualisation.
Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

16 Fig. 15 Waveform examples: left 1 waveform, right waveforms from 100 measurements. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

17 Fig. 16 Measurement process results: waveforms from 100 measurements 300 cycles before trigger point. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

18 Fig. 17 Measurement and alignment processes results: waveforms from 100 aligned measurements 300 cycles before trigger point. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

19 Fig. 18 Correlation coefficient on plaintext traces for 1st AES key byte. Displayed values from 0x00 to 0x03. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

20 Fig. 19 Correlation coefficient of SBox output traces for 1st AES key byte value 0xA0 to 0xA3. Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions

21 Fig. 20 An example of computation ordered guessed key display.
Forensic Science International  , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions


Download ppt "Differential Power Analysis as a digital forensic tool"

Similar presentations


Ads by Google