Presentation is loading. Please wait.

Presentation is loading. Please wait.

Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, 05.02.2010 BCRYPT.

Similar presentations


Presentation on theme: "Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, 05.02.2010 BCRYPT."— Presentation transcript:

1 Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, 05.02.2010 BCRYPT Workshop Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology Side-Channel and Fault Attacks on RFID Michael Hutter BCRYPT RFID Security Workshop 2010

2 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 2 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Presentation Outline  Side Channel Analysis on RFID  Measurement Setups  Attacks  Results  Fault Attacks on RFID  Measurement Setups  Attacks  Results  Conclusions

3 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 3 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop A typical SCA Setup…

4 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 4 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop SCA on RFID ?  No resistor  No trigger  Low power  Strong reader field

5 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 5 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Practical Solutions  …electromagnetic measurements  Trigger on RFID communication  Use analog amplifiers  Apply pre-processing techniques  Apply reader-signal cancelation techniques

6 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 6 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques  Frequency Selective Measurements Picture R&S®

7 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 7 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques  Frequency Selective Measurements  Helmholtz Arrangement Picture R&S®

8 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 8 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques  Frequency Selective Measurements  Helmholtz Arrangement  Phase-Shifted Signal Subtraction Picture R&S® Shift xº

9 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 9 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Another Solution… …Contact-based Power Analysis

10 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 10 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop SCA Results ISO 18000-6C Gen2 UHF tagISO 15693 HF tag

11 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 11 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Interesting Observation…  The power consumption raises earlier for certain input values…  …because many RFID tags process data serially  This can be exploited in timing attacks

12 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 12 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop How to perform Fault Attacks on RFID?

13 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 13 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions  EM Fault Injections

14 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 14 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions  EM Fault Injections  Antenna Tearing

15 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 15 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions  EM Fault Injections  Antenna Tearing  Optical Inductions

16 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 16 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Another Solution… …Contact-based Fault Injection Setup

17 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 17 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop sweep

18 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 18 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Fault Analysis Results  Faults cause the tags to write faulty values into the memory  The value can be influenced by the adversary  Optical Fault Inductions allow unnoticed writing of faulty values

19 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 19 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Conclusion  EM as well as power-analysis attacks pose a serious threat in security-enabled RFID applications  Fault attacks can be used to write faulty values into the tag’s memory without detection

20 http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 20 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop http://www.iaik.tugraz.at/content/research/implementation_attacks/ Michael Hutter IAIK – Graz University of Technology michael.hutter@iaik.tugraz.at www.iaik.tugraz.at michael.hutter@iaik.tugraz.at www.iaik.tugraz.at Side-Channel and Fault Attacks on RFID


Download ppt "Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, 05.02.2010 BCRYPT."

Similar presentations


Ads by Google