Abstract
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their internal programs. It is a passive attack in the sense that it can be applied in an undetectable way during normal interaction with the smart card without modifying the card or the protocol in any way. The attack is particularly dangerous in financial applications such as ATM cards, credit cards, and electronic wallets, in which users have to insert their cards into card readers which are owned and operated by potentially dishonest entities. In this paper we describe a new solution to the problem, which com- pletely decorrelates the external power supplied to the card from the internal power consumed by the chip. The new technique is very easy to implement, costs only a few cents per card, and provides perfect protec- tion from passive power analysis.
Chapter PDF
Similar content being viewed by others
Keywords
References
D. Boneh, R. A. Demillo and R. J. Lipton, On the Importance of Checking Cryptographic Protocols for Faults, Proceedings of Eurocrypt 97, Springer-Verlag, 1997, pp 37–51.
P. Kocher, Timing Attacks on Implementations of Difie-Hellman, RSA, DSS, and Other Systems, Proceedings of Crypto 96, Springer-Verlag, 1996, pp 104–113.
O. Kommerling and M. Kuhn, Design Principles for Tamper Resistant Smartcard Processors, Proceedings of USENIX Workshop on Smartcard Technology, USENIX Association, pp. 9–20, 1999. http://www.cl.cam.ac.uk/~mgk25/sc99-tamper[-slides].pdf.
P. Kocher, J. Jaffe, and B. Jun, Introduction to Differential Power Analysis and Related Attacks, http://www.cryptography.com/dpa/technical/index.html, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shamir, A. (2000). Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies. In: Koç, Ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2000. CHES 2000. Lecture Notes in Computer Science, vol 1965. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44499-8_5
Download citation
DOI: https://doi.org/10.1007/3-540-44499-8_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41455-1
Online ISBN: 978-3-540-44499-2
eBook Packages: Springer Book Archive