Academia.eduAcademia.edu

Smart Card Security

2007

Abstract
sparkles

AI

This paper discusses the security of smart cards, focusing on cryptographic protocols and algorithms, as well as vulnerabilities that arise from their physical implementation. It highlights different types of attacks, particularly man-in-the-middle and side channel attacks, detailing how attackers can exploit timing and power consumption characteristics to deduce sensitive information. The effectiveness of these attacks and the necessary countermeasures are examined, emphasizing the critical need for heightened security protocols in smart card applications.

Key takeaways

  • Smart cards can also be attacked by inducing a fault during their normal processing to change the chips behaviour.
  • This attack was conducted against a PC implementation but a similar analysis can be applied to smart card implementations.
  • possible combinations an attack by simple power analysis would be extremely difficult.
  • The first example of a theoretical fault attack was presented in 1997 [7] as a method of injecting faults in to RSA signature generation when using the Chinese Remainder Theorem.
  • This implies a significant overhead when implementing cryptographic algorithms for smart cards but is necessary to defend against modern attack techniques.