Download presentation
Presentation is loading. Please wait.
Published byDina Wilkerson Modified over 8 years ago
1
New Methods for Cost-Effective Side- Channel Attacks on Cryptographic RFIDs Chair for Embedded Security Ruhr University Bochum David Oswald Timo Kasper Christof Paar www.crypto.rub.de 01.07.2009
2
Motivation
3
RFID Smartcards Applications: Payment, Access control,... Proprietary ciphers: Often insecure New Generation: 3DES / AES Mathematically secure Side Channel Analysis? 01.07.2009 3 Source: Wikimedia Commons
4
RFID Side Channel Measurement: Authentication Protocol 01.07.2009 4 ? Reader: Send protocol value Smartcard: Encrypt this value with 3DES Output: Success/Failure Measure EM
5
Measurement Setup
6
01.07.2009 6
7
Measurement Setup ISO14443-compatible Freely Programmable Low Cost (< 40 €) 01.07.2009 7
8
Measurement Setup 1 GS/s, 128 MB Memory ± 100 mV USB 2.0 Interface 01.07.2009 8
9
Measurement Setup 01.07.2009 9 Aim: Reduce Carrier Wave Influence vs.
10
Carrier Dampening 01.07.2009 10 Aim: Reduce Carrier Wave Influence vs.
11
Carrier Dampening Side-Channel Model (idealised): = 01.07.2009 11
12
Carrier Dampening Side-Channel Model (idealised): = 01.07.2009 12
13
Carrier Dampening 01.07.2009 13
14
Side Channel Analysis Step 1: Raw measurements
15
Trace (without analogue filter) 01.07.2009 15
16
Trace (without analogue filter) 01.07.2009 16
17
Trace (without analogue filter) 01.07.2009 17 ?
18
Step 2: Analogue filter
19
Trace (with analogue filter) 01.07.2009 19
20
Trace (with analogue filter) 01.07.2009 20
21
Trace (with analogue filter) 01.07.2009 21 ?
22
Step 3: Digital Demodulation
23
Digital Demodulation Rectifier Digital Filter Digital Demodulator 01.07.2009 23
24
Digital Demodulation 01.07.2009 24
25
Digital Demodulation 01.07.2009 25 ?!
26
Step 4: Alignment
27
Alignment Pick Reference Pattern 01.07.2009 27
28
Alignment Pick Reference Pattern 01.07.2009 28
29
Alignment 01.07.2009 29
30
Alignment 01.07.2009 30 Varies for identical Plaintext
31
Step 5: Location of 3DES
32
Data Bus Locate Plain- & Ciphertext Transfer 01.07.2009 32
33
Data Bus DPA: Plaintext 01.07.2009 33 8 Bit Hamming Weight
34
Data Bus DPA: Ciphertext 01.07.2009 34 8 Bit Hamming Weight
35
Trace Overview 01.07.2009 35 PlaintextCiphertext3DES... Other processing
36
Assumptions 01.07.2009 36 ?! CC CC 3DES
37
Step 6: Attack
38
3DES Engine DPA 3DES located Power Model: Hamming distance R0 R1, 4 Bit (S-Box output) 01.07.2009 38 ? ! CC CC 3DES
39
3DES-Engine DPA But: Only for S-Box 1 & 3 01.07.2009 39
40
3DES Engine DPA: Peak Extraction 01.07.2009 40
41
3DES Engine DPA: Peak Extraction 01.07.2009 41
42
3DES Engine DPA: Binwise 01.07.2009 42
43
3DES Engine DPA: Binwise 01.07.2009 43 Apply DPA binwise
44
3DES Engine DPA: Binwise Correlation Correct Key for 4 of 8 S-Boxes 01.07.2009 44
45
Conclusion
46
Results Real World Device Black Box Analysis Low Cost Key Recovery 01.07.2009 46
47
Summary Measurement Setup built Profiling done Data Bus revealed Correct Subkey for 4/8 S-Boxes found 01.07.2009 47
48
Future Work Improve –More traces –Equipment Extend –Other RFID smartcards Remote Attacks 01.07.2009 48
49
Thank you for your attention! Questions? Chair for Embedded Security Timo Kasper David Oswald Christof Paar www.crypto.rub.de timo.kasper@rub.de david.oswald@rub.de cpaar@crypto.rub.de
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.