Download presentation
Presentation is loading. Please wait.
Published byGwendoline Daniel Modified over 9 years ago
1
Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 1 TU Graz/Computer Science/IAIK/VLSI/SCA Leuven, 05.02.2010 BCRYPT Workshop Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology Side-Channel and Fault Attacks on RFID Michael Hutter BCRYPT RFID Security Workshop 2010
2
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 2 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Presentation Outline Side Channel Analysis on RFID Measurement Setups Attacks Results Fault Attacks on RFID Measurement Setups Attacks Results Conclusions
3
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 3 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop A typical SCA Setup…
4
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 4 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop SCA on RFID ? No resistor No trigger Low power Strong reader field
5
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 5 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Practical Solutions …electromagnetic measurements Trigger on RFID communication Use analog amplifiers Apply pre-processing techniques Apply reader-signal cancelation techniques
6
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 6 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques Frequency Selective Measurements Picture R&S®
7
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 7 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques Frequency Selective Measurements Helmholtz Arrangement Picture R&S®
8
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 8 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Reader-Signal Cancelation Techniques Frequency Selective Measurements Helmholtz Arrangement Phase-Shifted Signal Subtraction Picture R&S® Shift xº
9
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 9 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Another Solution… …Contact-based Power Analysis
10
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 10 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop SCA Results ISO 18000-6C Gen2 UHF tagISO 15693 HF tag
11
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 11 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Interesting Observation… The power consumption raises earlier for certain input values… …because many RFID tags process data serially This can be exploited in timing attacks
12
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 12 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop How to perform Fault Attacks on RFID?
13
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 13 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions EM Fault Injections
14
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 14 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions EM Fault Injections Antenna Tearing
15
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 15 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Solutions EM Fault Injections Antenna Tearing Optical Inductions
16
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 16 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Another Solution… …Contact-based Fault Injection Setup
17
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 17 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop sweep
18
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 18 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Fault Analysis Results Faults cause the tags to write faulty values into the memory The value can be influenced by the adversary Optical Fault Inductions allow unnoticed writing of faulty values
19
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 19 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop Conclusion EM as well as power-analysis attacks pose a serious threat in security-enabled RFID applications Fault attacks can be used to write faulty values into the tag’s memory without detection
20
http://www.iaik.tugraz.at Institute for Applied Information Processing and Communications (IAIK) – VLSI & Security 20 TU Graz/Computer Science/IAIK/VLSI/SCA BCRYPT Workshop http://www.iaik.tugraz.at/content/research/implementation_attacks/ Michael Hutter IAIK – Graz University of Technology michael.hutter@iaik.tugraz.at www.iaik.tugraz.at michael.hutter@iaik.tugraz.at www.iaik.tugraz.at Side-Channel and Fault Attacks on RFID
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.