Abstract
We present a unified framework for advanced implementation attacks that allows for conducting automated side-channel analysis and fault injection targeting all kinds of embedded cryptographic devices including RFIDs. Our proposed low-cost setup consists of modular functional units that can be interchanged, depending on the demands of a concrete attack scenario. We give details of customized modules for the communication with many types of embedded devices and other modules that allow to inject various types of faults. An FPGA-based approach enables very accurate timing and flexible adaption to any extension module. The corresponding data acquisition system for side-channel attacks makes precise power and EM analyses possible. Our setup facilitates the promising combination of active and passive techniques, which is known to render many established security countermeasures ineffective. We introduce several methods for the automatic profiling of cryptographic devices and model their behaviour both with respect to side-channel analysis and fault injection. To demonstrate the capabilities of our framework, we perform the first practical full key-recovery on a cryptographic contactless smartcard employing Triple-DES reported in the literature and inject multiple faults in a widespread microcontroller. We thereby disprove the common belief that highly sophisticated and expensive equipment is required to conduct such attacks. Rather, we illustrate a cost-effective setup that can be tailored to any desired type of security evaluation or penetration test.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
ISO 7816 Identification Cards - Integrated Circuit Cards with Contacts (2004)
Agrawal, D., Archambeault, B., Rao, J., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)
Amiel, F., Villegas, K., Feix, B., Marcel, L.: Passive and active combined attacks: Combining fault attacks and side channel analysis. In: Proceedings of the Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2007, Washington, DC, USA, pp. 92–102. IEEE Computer Society, Los Alamitos (2007)
Analog Devices, Inc. AD8058 Dual, High Performance Voltage Feedback, 325 MHz Amplifier Datasheet (2003)
Analog Devices, Inc. AD9708 8-Bit, 100 MSPS+ TxDAC D/A Converter Datasheet (2009)
Atmel. ATMega32 Data Sheet, http://www.atmel.com
Atmel. Datasheet of Read/Write Base Station U2270B (2008), http://www.atmel.com
Brier, E., Clavier, C., Olivier, F.: Correlation Power Analysis with a Leakage Model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16–29. Springer, Heidelberg (2004)
Carluccio, D., Lemke, K., Paar, C.: Electromagnetic Side Channel Analysis of a Contactless Smart Card: First Results. In: RFIDSec 2005 Workshop on RFID and Lightweight Crypto (July 2005), http://events.iaik.tugraz.at/RFIDandLightweightCrypto05/RFID-SlidesandProceedings/Carluccio-EMSideChannel.pdf
Club, C.C.: RFID Zapper (2005)
Corson, D.: Comparing 8-bit Microcontrollers for Ultra-low-power Applications, 3 p., table 1 (October 2005)
Fournier, J.J.A., Moore, S., Li, H., Mullins, R., Taylor, G.: Security Evaluation of Asynchronous Circuits, pp. 137–151 (2003)
Giraud, C., Thiebeauld, H.: A Survey on Fault Attacks. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., Kalam, A.A.E. (eds.) CARDIS, pp. 159–176. Kluwer, Dordrecht (2004)
Hamid, H.B.-E., Choukri, H., Tunstall, D.N.M., Whelan, C.: The Sorcerer’s Apprentice Guide to Fault Attacks (2004)
Handschuh, H.: Contactless Technology Security Issues. Information Security Bulletin 9 (2004), http://www.chi-publishing.com/samples/ISB0903HH.pdf
Handschuh, H., Paillier, P., Stern, J.: Probing Attacks on Tamper-Resistant Devices. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 303–315. Springer, Heidelberg (1999)
Hutter, M., Schmidt, J.-M., Plos, T.: RFID and Its Vulnerability to Faults. In: Oswald, E., Rohatgi, P. (eds.) CHES 2008. LNCS, vol. 5154, pp. 363–379. Springer, Heidelberg (2008)
International Organization for Standardization. ISO/IEC 14443-3: Identification Cards - Contactless Integrated Circuit(s) Cards - Proximity Cards - Part 3: Initialization and Anticollision, 1st edition (February 2001)
International Organization for Standardization. ISO/IEC 14443-4: Identification cards - Contactless Integrated Circuit(s) Cards - Proximity Cards - Part 4: Transmission Protocol, 1st edition (February 2001)
ISO/IEC 14443. Identification cards - Contactless integrated circuit(s) cards - Proximity cards - Part 1-4 (2001), http://www.iso.ch
Kasper, T.: Embedded Security Analysis of RFID Devices. Master’s thesis, Ruhr Universität Bochum (2006)
Kasper, T., Carluccio, D., Paar, C.: An Embedded System for Practical Security Analysis of Contactless Smartcards. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 150–160. Springer, Heidelberg (2007)
Kasper, T., Oswald, D., Paar, C.: EM Side-Channel Attacks on Commercial Contactless Smartcards using Low-Cost Equipment. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 79–93. Springer, Heidelberg (2009)
Kasper, T., Silbermann, M., Paar, C.: All You Can Eat or Breaking a Real-World Contactless Payment System. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 343–350. Springer, Heidelberg (2010)
Kim, C.H., Quisquater, J.-J.: Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 215–228. Springer, Heidelberg (2007)
Kömmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors, pp. 9–20 (1999)
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kugelstadt, T.: Op Amps for Everyone. In: Interfacing D/A Converters to Loads, ch. 14, 2nd edn., p. 239. Texas Instruments (2003)
Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, Secaucus (2007)
Melito, M.: Application Note 484/1293, Car Ignition with IGBTs (1999)
Microchip Technology Inc. PIC16F631/677/685/687/689/690 Data Sheet 20-Pin Flash-Based, 8-Bit CMOS Microcontrollers with nanoWatt Technology(2008)
Nohl, K., Evans, D., Starbug, Plötz, H.: Reverse-Engineering a Cryptographic RFID Tag. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 185–194 (2008)
NXP. Data Sheet of Mifare Classic 4k chip MF1ICS70 (2008)
Oren, Y., Shamir, A.: Power Analysis of RFID Tags, http://www.wisdom.weizmann.ac.il/~yossio/rfid/
Plos, T.: Susceptibility of UHF RFID Tags to Electromagnetic Analysis. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 288–300. Springer, Heidelberg (2008)
Potato Semiconductor Corporation. PO74G08A Quadruple 2-input positive AND gate (2009)
Schmidt, J.-M.: Differential Fault Analysis - Final Report. Technical report, TU Graz (June 2008)
Schmidt, J.-M., Herbst, C.: A Practical Fault Attack on Square and Multiply. In: Proc. 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2008, pp. 53–58 (August 10, 2008)
Shanmugam, K.S.: Digital & Analog Communication Systems, ch. 8.3.2. Wiley-India (2006)
ST Microelectronics. Data Sheet for STP10NK50Z, N-Channel Zener-Protected MOSFET (2005)
Waddle, J., Wagner, D.: Fault Attacks on Dual-Rail Encoded Systems. In: Computer Security Applications Conference, Annual, pp. 483–494 (2005)
Xilinx Inc. PicoBlaze 8-bit Embedded Microcontroller User Guide, v. 1.1.2 edition (June 2008)
Xilinx Inc. Spartan-3 FPGA Starter Kit Board User Guide, v 1.2 edition (June 2008)
Xilinx Inc. PicoBlaze User Resources. Web resource (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kasper, T., Oswald, D., Paar, C. (2010). A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds) Transactions on Computational Science X. Lecture Notes in Computer Science, vol 6340. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17499-5_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-17499-5_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17498-8
Online ISBN: 978-3-642-17499-5
eBook Packages: Computer ScienceComputer Science (R0)