Fault attacks on “secure” Smart Card

dc.contributor.authorLing, Jie
dc.contributor.authorKing, Brian
dc.date.accessioned2014-11-20T17:09:53Z
dc.date.available2014-11-20T17:09:53Z
dc.date.issued2013-04-05
dc.descriptionposter abstracten_US
dc.description.abstractToday’s software engineers are faced with the problem of building secure systems from untrustworthy components, which used widely in everyday life. A Smart Card is a popular security token, with applications integrated in many areas including: credit cards, bank cards, cellular communications, electronic cash, banking, satellite TV and Government identifications. Smart cards are often touted as “secure” portable devices. Applications often assume that information (keys) stored on the card will be securely stored, and access control to the information will be properly maintained. Unfortunately, it has been repeatedly proven that Smart Cards are not as secure as they are commonly supposed to be. For example consider the following scenario, you go to restaurant and pay your bill with a Smart Card (type of bank card), when you pay the bill, do you constantly monitor/observe the card as the waiter uses the card? After the waiter takes the card into their possession, it is possible that they continue to swipe your card in a manner to purposely induce faults and record all the faulty/error information outputted. By analyzing the faulty output later off-line they can retrieve all secret keys, and construct a clone of your card, using it for their needs at your expense. This technique, based on fault injections which modify the behavior of the application, is named “Fault Attack”. Fault attacks on Smart Cards may be diverse in nature but successful nevertheless. In this project using fault attack, we have simulated the process of key recovery for both Elliptic Curve Cryptography (ECC) and RSA systems. Our work investigates both attacks and countermeasure to the attacks.en_US
dc.identifier.citationLing, J., King, B. (2013, April 5). Fault attacks on “secure” Smart Card. Poster session presented at IUPUI Research Day 2013, Indianapolis, Indiana.en_US
dc.identifier.urihttps://hdl.handle.net/1805/5494
dc.language.isoen_USen_US
dc.publisherOffice of the Vice Chancellor for Researchen_US
dc.subjectsmart cardsen_US
dc.subjectsecurityen_US
dc.subjectfault attacksen_US
dc.titleFault attacks on “secure” Smart Carden_US
dc.typeOtheren_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ling-fault.pdf
Size:
72.01 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.88 KB
Format:
Item-specific license agreed upon to submission
Description: