Download presentation
Presentation is loading. Please wait.
Published byRandolf Owen Waters Modified over 6 years ago
1
Differential Power Analysis as a digital forensic tool
T. Souvignet, J. Frinken Forensic Science International Volume 230, Issue 1, Pages (July 2013) DOI: /j.forsciint Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
2
Fig. 1 Breakdown of domestic payment fraud by fraud type. (For interpretation of the references to color in this figure legend, the reader is referred to the web version of this article.) Source: French Observatory for Payment Cards Security. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
3
Fig. 2 Evolution of skimming cases and related loss.
Source: French Observatory for Payment Cards Security based on data from EAST. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
4
Fig. 3 EMV card deployment – march 2012.
Source: French Observatory for Payment Cards Security based on data from European Payments Council. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
5
Fig. 4 At top, a PIN acquisition board (based on a mp4 recorder) and a card data acquisition board at bottom. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
6
Fig. 5 MSR skimmers. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
7
Fig. 6 SPA traces. Source: BKA / [12].
Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
8
Fig. 7 Example of correlation trace (peaks imply high correlation between hypothetical and measured power consumption). Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
9
Fig. 8 Front and back of the skimmer board with all electronic components removed. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
10
Fig. 9 AES encryption subroutine before/after modification.
Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
11
Fig. 10 BKA analysis board. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
12
Fig. 11 Whole communications operated during the card data storage.
Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
13
Fig. 12 Ciphertext stored within the Flash memory.
Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
14
Fig. 13 AES assembly code: SubBytes and ShiftRows done at the same time. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
15
Fig. 14 Logic analyser encryption process visualisation.
Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
16
Fig. 15 Waveform examples: left 1 waveform, right waveforms from 100 measurements. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
17
Fig. 16 Measurement process results: waveforms from 100 measurements 300 cycles before trigger point. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
18
Fig. 17 Measurement and alignment processes results: waveforms from 100 aligned measurements 300 cycles before trigger point. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
19
Fig. 18 Correlation coefficient on plaintext traces for 1st AES key byte. Displayed values from 0x00 to 0x03. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
20
Fig. 19 Correlation coefficient of SBox output traces for 1st AES key byte value 0xA0 to 0xA3. Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
21
Fig. 20 An example of computation ordered guessed key display.
Forensic Science International , DOI: ( /j.forsciint ) Copyright © 2013 Elsevier Ireland Ltd Terms and Conditions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.