What are the threats ?Confidentiality:unauthorized disclosure of informationIntegrity:unauthorized modification of informationAuthenticity:unauthorized use of servicesenderreceiver
Smart card conceptsA smart card:can store data (e.g. profiles, balances, personal data) provides cryptographic services (e.g. authentication, confidentiality, integrity)is a microcomputeris small and personalis a secure device
Smart card application areasCommunicationEntertainmentRetailTransportationHealth careGovernmentE-commerceE-bankingEducationOffice
Smart card applications (1)RetailSale of goods using Electronic Purses, Credit / DebitVending machinesLoyalty programsTags & smart labelsCommunicationGSMPayphones TransportationPublic TrafficParkingRoad Regulation (ERP)Car Protection
EntertainmentPay-TVPublic event access control
Smart card applications (2)HealthcareInsurance dataPersonal dataPersonal file
GovernmentIdentificationPassportDriving licenseE-commercesale of informationsale of productssale of tickets, reservations E-bankingaccess to accountsto do transactionsshares
Smart card applications (3)Educational facilitiesPhysical accessNetwork accessPersonal data (results)Copiers, vending machines, restaurants, ... OfficePhysical accessNetwork accessTime registrationSecure e-mail & Web applications
Smart card architecturePhysical appearance:Credit card or SIM dimensionsContacts or contactless
Whats inside a smart card ?CPU
Central ProcessingUnit:
heart of the chip
Whats inside a smart card ?CPU
security logicsecurity logic:
detecting abnormal conditions,e.g. low voltage
Whats inside a smart card ?CPU
serial i/ointerfacesecurity logicserial i/o interface:
contact to the outside world
Whats inside a smart card ?CPU
serial i/ointerfacesecurity logictest logic:
self-test procedures
Whats inside a smart card ?CPU
serial i/ointerfacesecurity logicROM:
card operating system self-test procedures typically 16 kbytes future 32/64 kbytes
Whats inside a smart card ?CPU
serial i/ointerfacesecurity logicRAM:
scratch pad of the processor
typically 512 bytesfuture 1 kbyte
Whats inside a smart card ?CPU
serial i/ointerfacesecurity logicEEPROM:
cryptographic keysPIN codebiometric templatebalanceapplication codetypically 8 kbytesfuture 32 kbytes
Whats inside a smart card ?databus:
connection between elements of the chip
8 or 16 bits wide
Smart card chip
Basic smart card security featuresHardwareclosed packagememory encapsulationfusessecurity logic (sensors)cryptographic coprocessors and random generatorSoftwaredecoupling applications and operating systemapplication separation (Java card)restricted file accesslife cycle controlvarious cryptographic algorithms and protocols
Smart card attacksInternal AttacksSide Channel AttacksLogical Attacks
InternalAttacksetching toolsMicroscopeProbe stationlaser cuttersScanning Electron MicroscopeFocussed Ion Beam Systemand more.Lab pictures provided by TNO
Reverse engineering
Staining of ion implant ROM array
Sub micron probe station
Probing with eight needles
FIB: fuse repair
Internal attack counter measuresAlarm (sensors)lightactive gridHidefeature size (< 300 nm)multi-layerburied busbus scramblingshieldConfuseglue logicredundant logic
Logical attacksCommunicationCommand scanFile system scanInvalid / inopportune requestsCrypt-analysis and protocol abuse
Logical attack counter measuresCommand scanlimit command availabilityrestrict and verify command codinglife cycle managementFile system scanrestrict file accesstest file access mechanisms (PIN. AUT, etc)Invalid / inopportune requestsexclude non-valid behaviour verify conformanceCrypt analysis and protocol abusepublish algorithms and initiate public discussionevaluate crypto algorithm and protocol
Side channelAttacksUse of hidden signalselectromagnetic emissionpower consumptiontimingInsertion of signalspower glitcheselectromagnetic pulses
Power analysispeakslopetimeIddqareashape
Power waveform
Fault injection on smart cardsChange a value read from memory to another value by manipulating the supply power:
Side channel attack counter measuresSignal analysisreduce processor signal by balancing or equalising the power and/or shielding the emissionadd noise to the processor activity (both in time and amplitude)eliminate timing relation with processed key and or datavariable ordering of processesblinding of intermediate values with random valuesretry counterslimited control and visibility of crypto input and outputSignal insertionuse sensors for supply voltage, light and temperaturedouble implementation path (for verification)check for runtime parameter validity
ConclusionsSmart card technology is emerging, applications are everywhereSmart cards enhance service and securityPerfect security does not exist, even not for smart cardsRisk analysis is essential
More info? Mailto: [email protected]
*
Top Related