Browse > Article
http://dx.doi.org/10.13089/JKIISC.2008.18.1.31

Investigation of Side Channel Analysis Attacks on Financial IC Cards  

Kim, Chang-Kyun (The Attached Institute of ETRI)
Park, Il-Hwan (The Attached Institute of ETRI)
Abstract
The development of next-generation resident registration cards, financial IC cards and administrative agency IC cards based on a smart card is currently coming out in Korea. However, the low-price IC cards without countermeasures against side channel analysis attacks are expected to be used fer cost reduction. This paper has investigated the side channel resistance of financial IC cards that are currently in use and have performed DPA attacks on the financial IC cards. We have been able to perform successful DPA attacks on these cards by using only 100 power measurement traces. From our experiment results, we have been able to extract the master key used for encryption of a count PIN number.
Keywords
DPA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 금융결제원, "금융IC카드표준," 2005년 1월
2 E. Biham and A. Shamir, "Differential Fault Analysis of Secret Key Cryptosystems," CRYPTO'97, LNCS 1294, pp. 513-525, Springer-Verlag, 1997
3 J. Ha, C. Kim, S. Moon, I. Park, and H. Yoo, "Differential Power Analysis on Block Cipher ARIA," HPCC'05, LNCS 3726, pp. 541-548, Springer-Verlag, 2005
4 행정자치부, "행정기관 IC카드 표준규격," 2005년 6월
5 K. Gandolfi, C. Mourtel, and F. Olivier, "Electromagnetic Analysis: Concrete Results," CHES'01, LNCS 2162, pp. 251-261, Springer- Verlag, 2001
6 한국정보통신기술협회, TTAS.KO-12.0004 : 128비트 블록암호알고리즘 표준, 1999
7 P. Kocher, J. Jaffe and B.Jun, "Differential Power Analysis," CRYPTO'99, LNCS 1666, pp. 388-397, Springer-Verlag, 1999
8 H. Yoo, C. Herbst, S. Mangard, E. Oswald, and S. Moon, "Investigations of Power Analysis Attacks and Countermeasures for ARIA," WISA'06, LNCS 4298, pp. 160-172, Springer-Verlag, 2007
9 D. Kwon, J. Kim, S. Park, S. Sung, Y. Sohn, J. Song, Y. Yeom, E. Yoon, S. Lee, J.Lee, S. Chee, D. Han and J. Hong, "New Block Cipher : ARIA," ICISC'03, LNCS 2971, pp. 432-445, Springer-Verlag, 2003
10 P. Kocher, "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," CRYPTO'96, LNCS 1109, pp. 104-113, Springer-Verlag, 1996