SMART CARD PPT PRESENTATION

33
What are the threats ? Confidentiality:unauthorized disclosure disclosure of information Integrity: unauthorized modification modification of information Authenticity: unauthorized use of service sender receiver

description

It includes ppt on smart card.

Transcript of SMART CARD PPT PRESENTATION

  • What are the threats ?Confidentiality:unauthorized disclosure of informationIntegrity:unauthorized modification of informationAuthenticity:unauthorized use of servicesenderreceiver

  • Smart card conceptsA smart card:can store data (e.g. profiles, balances, personal data) provides cryptographic services (e.g. authentication, confidentiality, integrity)is a microcomputeris small and personalis a secure device

  • Smart card application areasCommunicationEntertainmentRetailTransportationHealth careGovernmentE-commerceE-bankingEducationOffice

  • Smart card applications (1)RetailSale of goods using Electronic Purses, Credit / DebitVending machinesLoyalty programsTags & smart labelsCommunicationGSMPayphones TransportationPublic TrafficParkingRoad Regulation (ERP)Car Protection

    EntertainmentPay-TVPublic event access control

  • Smart card applications (2)HealthcareInsurance dataPersonal dataPersonal file

    GovernmentIdentificationPassportDriving licenseE-commercesale of informationsale of productssale of tickets, reservations E-bankingaccess to accountsto do transactionsshares

  • Smart card applications (3)Educational facilitiesPhysical accessNetwork accessPersonal data (results)Copiers, vending machines, restaurants, ... OfficePhysical accessNetwork accessTime registrationSecure e-mail & Web applications

  • Smart card architecturePhysical appearance:Credit card or SIM dimensionsContacts or contactless

  • Whats inside a smart card ?CPU

    Central ProcessingUnit:

    heart of the chip

  • Whats inside a smart card ?CPU

    security logicsecurity logic:

    detecting abnormal conditions,e.g. low voltage

  • Whats inside a smart card ?CPU

    serial i/ointerfacesecurity logicserial i/o interface:

    contact to the outside world

  • Whats inside a smart card ?CPU

    serial i/ointerfacesecurity logictest logic:

    self-test procedures

  • Whats inside a smart card ?CPU

    serial i/ointerfacesecurity logicROM:

    card operating system self-test procedures typically 16 kbytes future 32/64 kbytes

  • Whats inside a smart card ?CPU

    serial i/ointerfacesecurity logicRAM:

    scratch pad of the processor

    typically 512 bytesfuture 1 kbyte

  • Whats inside a smart card ?CPU

    serial i/ointerfacesecurity logicEEPROM:

    cryptographic keysPIN codebiometric templatebalanceapplication codetypically 8 kbytesfuture 32 kbytes

  • Whats inside a smart card ?databus:

    connection between elements of the chip

    8 or 16 bits wide

  • Smart card chip

  • Basic smart card security featuresHardwareclosed packagememory encapsulationfusessecurity logic (sensors)cryptographic coprocessors and random generatorSoftwaredecoupling applications and operating systemapplication separation (Java card)restricted file accesslife cycle controlvarious cryptographic algorithms and protocols

  • Smart card attacksInternal AttacksSide Channel AttacksLogical Attacks

  • InternalAttacksetching toolsMicroscopeProbe stationlaser cuttersScanning Electron MicroscopeFocussed Ion Beam Systemand more.Lab pictures provided by TNO

  • Reverse engineering

  • Staining of ion implant ROM array

  • Sub micron probe station

  • Probing with eight needles

  • FIB: fuse repair

  • Internal attack counter measuresAlarm (sensors)lightactive gridHidefeature size (< 300 nm)multi-layerburied busbus scramblingshieldConfuseglue logicredundant logic

  • Logical attacksCommunicationCommand scanFile system scanInvalid / inopportune requestsCrypt-analysis and protocol abuse

  • Logical attack counter measuresCommand scanlimit command availabilityrestrict and verify command codinglife cycle managementFile system scanrestrict file accesstest file access mechanisms (PIN. AUT, etc)Invalid / inopportune requestsexclude non-valid behaviour verify conformanceCrypt analysis and protocol abusepublish algorithms and initiate public discussionevaluate crypto algorithm and protocol

  • Side channelAttacksUse of hidden signalselectromagnetic emissionpower consumptiontimingInsertion of signalspower glitcheselectromagnetic pulses

  • Power analysispeakslopetimeIddqareashape

  • Power waveform

  • Fault injection on smart cardsChange a value read from memory to another value by manipulating the supply power:

  • Side channel attack counter measuresSignal analysisreduce processor signal by balancing or equalising the power and/or shielding the emissionadd noise to the processor activity (both in time and amplitude)eliminate timing relation with processed key and or datavariable ordering of processesblinding of intermediate values with random valuesretry counterslimited control and visibility of crypto input and outputSignal insertionuse sensors for supply voltage, light and temperaturedouble implementation path (for verification)check for runtime parameter validity

  • ConclusionsSmart card technology is emerging, applications are everywhereSmart cards enhance service and securityPerfect security does not exist, even not for smart cardsRisk analysis is essential

    More info? Mailto: [email protected]

    *