TY - JOUR
T1 - Side-channel attack on a protected RFID card
AU - Xu, Rixin
AU - Zhu, Liehuang
AU - Wang, An
AU - Du, Xiaojiang
AU - Choo, Kim Kwang Raymond
AU - Zhang, Guoshuang
AU - Gai, Keke
N1 - Publisher Copyright:
© 2013 IEEE.
PY - 2018/9/16
Y1 - 2018/9/16
N2 - Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First, a platform is setup to extract the power consumption information from the electromagnetic wave. Based on the findings from the initial analysis, we determine that the card is equipped with a 'head and tail protection' mechanism. Second, a chosen-plaintext power analysis with a complexity of 216 is proposed, which is designed to recover the second round key from the power leakage in the third round. Then, a slicing-collision-algebraic attack is presented, which decreases the complexity to 26 rapidly. The experiments show that after collecting 20000 power traces (in approximately 200 s), only 26× 8 key guesses and another 177 searches (about 300 seconds) are sufficient in recovering the 56-bit source keys of DES successfully. In other words, we demonstrate how the security of the 3DES card can be easily compromised, using side-channel attacks. Finally, we recommend that the head and tail protection should extend to the first and last four rounds, at the minimal, in order to be side-channel attack resilience.
AB - Side-channel attack is a known security risk to smart cards, and there have been efforts by smart card manufacturers to incorporate side-channel attack countermeasures. In this paper, we study a widely used smart card that uses the 3DES algorithm. First, a platform is setup to extract the power consumption information from the electromagnetic wave. Based on the findings from the initial analysis, we determine that the card is equipped with a 'head and tail protection' mechanism. Second, a chosen-plaintext power analysis with a complexity of 216 is proposed, which is designed to recover the second round key from the power leakage in the third round. Then, a slicing-collision-algebraic attack is presented, which decreases the complexity to 26 rapidly. The experiments show that after collecting 20000 power traces (in approximately 200 s), only 26× 8 key guesses and another 177 searches (about 300 seconds) are sufficient in recovering the 56-bit source keys of DES successfully. In other words, we demonstrate how the security of the 3DES card can be easily compromised, using side-channel attacks. Finally, we recommend that the head and tail protection should extend to the first and last four rounds, at the minimal, in order to be side-channel attack resilience.
KW - Cryptoanalysis
KW - Power analysis
KW - Side-channel analysis
KW - Smart card attack
UR - http://www.scopus.com/inward/record.url?scp=85053640088&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2018.2870663
DO - 10.1109/ACCESS.2018.2870663
M3 - Article
AN - SCOPUS:85053640088
SN - 2169-3536
VL - 6
SP - 58395
EP - 58404
JO - IEEE Access
JF - IEEE Access
M1 - 8466941
ER -