Key recovery against 3DES in CPU smart card based on improved correlation power analysis

Yanting Ren, Liji Wu*, Hexin Li, Xiangyu Li, Xiangmin Zhang, An Wang, Hongyi Chen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.

Original languageEnglish
Article number7442503
Pages (from-to)210-220
Number of pages11
JournalTsinghua Science and Technology
Volume21
Issue number2
DOIs
Publication statusPublished - Apr 2016

Keywords

  • CPU smart cards
  • Key recovery
  • Power analysis
  • Side-channel analysis
  • Triple Data Encryption Standard (3DES)

Fingerprint

Dive into the research topics of 'Key recovery against 3DES in CPU smart card based on improved correlation power analysis'. Together they form a unique fingerprint.

Cite this