AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (11.3 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis

Yanting RenLiji Wu( )Hexin LiXiangyu LiXiangmin ZhangAn WangHongyi Chen
Tsinghua National Laboratory for Information Science, Technology (TNList) and the Institute of Microelectronics, Tsinghua University, Beijing 100084, China.
China Information Technology Security Evaluation Center (CNITSEC), Beijing 100085, China.
School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China.
Show Author Information

Abstract

The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.

References

[1]
Kocher P., Jaffe J., and Jun B., Differential power analysis, in Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA, 1999, pp. 388-397.
[2]
Mangard S., Oswald E., and Popp T., Power Analysis Attacks: Revealing the Secrets of Smart Cards. Boston, MA, USA: Springer, 2007.
[3]
Moradi A., Kasper M., and Paar C., Black-box side-channel attacks highlight the importance of countermeasures—An analysis of the Xilinx Virtex-4 and Virtex-5 bitstream encryption mechanism, Lecture Notes in Computer Science, vol. 7178, pp. 1–18, 2012.
[4]
Eisenbarth T., Kasper T., Moradi A., Paar C., Salmasizadeh M., and Shalmani M. M., On the power of power analysis in the real world: A complete break of the KEELOQ code hopping scheme, in Proceedings of the 28th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA, 2008, pp. 203-220.
[5]
Oswald D. and Paar C., Breaking Mifare DESFire MF3ICD40: Power analysis and templates in the real world, Lecture Notes in Computer Science, vol. 6917, pp. 207–222, 2011.
[6]
Le T. H., Clediere J., Serviere C., and Lacoume J. L., Noise reduction in side channel attack using fourth-order cumulant, IEEE Transactions on Information Forensics & Security (TIFS), vol. 2, no. 4, pp. 710–720, 2007.
[7]
Clavier C., Coron J. S., and Dabbous N., Differential power analysis in the presence of hardware countermeasures, Lecture Notes in Computer Science, vol. 1965, pp. 252–263, 2000.
[8]
Charvet X. and Pelletier H., Improving the DPA attack using wavelet transform, in NIST Physical Security Testing Workshop, Honolulu, HI, USA, 2005.
[9]
Woudenberg J. J., Witteman M., and Bakker B., Improving differential power analysis by elastic alignment, Lecture Notes in Computer Science, vol. 6558, pp. 104–119, 2011.
[10]
Plos T., Hutter M., and Feldhofer M., Evaluation of side-channel preprocessing techniques on cryptographic-enabled HF and UHF RFID tag prototypes, in Workshop on RFID Security, Budapest, Hungary, 2008, pp. 114-127.
[11]
Brier E., Clavier C., and Olivier F., Correlation power analysis with a leakage model, Lecture Notes in Computer Science, vol. 3156, pp. 16–29, 2004.
[12]
U.S. Department of Commerce and NIST, Fips pub 46-3: data encryption standard (DES), 1999.
Tsinghua Science and Technology
Pages 210-220
Cite this article:
Ren Y, Wu L, Li H, et al. Key Recovery Against 3DES in CPU Smart Card Based on Improved Correlation Power Analysis. Tsinghua Science and Technology, 2016, 21(2): 210-220. https://doi.org/10.1109/TST.2016.7442503

585

Views

23

Downloads

5

Crossref

N/A

Web of Science

6

Scopus

0

CSCD

Altmetrics

Received: 09 April 2015
Revised: 26 October 2015
Accepted: 27 November 2015
Published: 31 March 2016
© The author(s) 2016
Return