Several Fault Attacks on Smart Card Signature Schemes
Date
Authors
Language
Embargo Lift Date
Department
Committee Members
Degree
Degree Year
Department
Grantor
Journal Title
Journal ISSN
Volume Title
Found At
Abstract
Today’s financial industry is moving towards digital signature enabled applications using smart card technology. Worldwide, many financial organizations have mandated to use smart card for financial credit and debit transfer. In addition, the United States government has adopted smart card technology for its major credentialing initiatives. So, a small security flaw can cost a massive loss in the industry, hence the security measurements of smart card is immense. A variety of attacks on smart card enabled signatures schemes have been proposed. In this work we discuss several fault attacks. Here, the attacker induces a fault on the smart card during the signature generation process as executed on the smart-card, thus outputting a faulty signature. By repeating this attack several times, the attacker collects enough faulty outputs that they can calculate the signing key. With this key, the attacker is then free to conduct transactions without any financial repercussion. In this work we discuss three types of fault attacks, the bit-flip attack, the counter fault attack and the doubling attack. Apart from implementing these attacks, the main challenge is to identify the valid patterns that can be used to match the correct key bits. Pruning invalid patterns (patterns that produce “false positive results”) also plays a significant role as it effectively reduces the time required for matching. We address this issue by constructing state machines which efficiently provide possible valid patterns and the algorithms that can be used to calculate the signing key.