Embedded smart card chips are open to hack attacks


This article can also be found in the Premium Editorial Download "Information Security magazine: Security 7 Award winners sound off on key information security issues."

Download it now to read this article plus other related content.


Cracking Smart Cards
Attackers "eavesdrop" on power output to steal crypto keys.

Smart cards

    Requires Free Membership to View

are designed for security and convenience. The secure, multipurpose authentication they provide makes them an attractive option for controlling logical and physical access to businesses and governments.

The embedded microchip smart grid technology is also an attractive target for hackers and pirates to commit fraud, theft and piracy.

Most of the hacks and countermeasures focus on power analysis attacks, which are performed by attackers using digital oscilloscopes eavesdropping on the power use of transistors as embedded smart card microchips perform cryptographic operations. Simple power analysis (SPA) directly interprets power use to "see" individual bits, and can crack the cryptokeys in seconds. However, basic security practices easily thwart SPA.

Differential power analysis (DPA) is the really serious threat. It applies statistical analysis across multiple power consumption measurements to overcome noise and countermeasures that obscure individual bits. The analysis reveals several bits of the cryptokey at a time and is repeated to eventually produce the entire key. The attacker guesses a few bits of the key and watches the power output; spikes in the pattern indicate correct guesses and provides a piece of the puzzle.

"DPA is a real threat to smart card technology, not just a theory," says Anoop Ubhey, smart card industry analyst for Frost and Sullivan. "DPA is inexpensive and is very powerful, because it circumvents the hardware and software security/encryption that companies have implemented in products. Also, DPA is non-invasive and does not leave a trace, which is why it is so scary."

Smart cards are ubiquitous in Europe, but have been slow to catch on in the U.S. Credit cards, for example, in the U.S. still use convenient, cheap magnetic strip technology. The Department of Defense's Common Access Card (CAC) program is probably the most well-known smart card deployment stateside.

But encryption embedded in smart card microchip technology is used in a variety of areas, including pay TV, where DPA is used to provide pirated access.

DPA was discovered by Cryptography Research Inc. (CRI) about a decade ago, and is a prime focus of security research, presented in forums such as August's Cryptographic Hardware & Embedded Systems (CHES) conference. In the intervening decade, security has become an increasing concern with the growth the crypto-protected microchip market.

CRI develops and licenses cryptography security technology to chip manufacturers, and sells an integrated product called CryptoFirewall, which can be used, for example, in pay TV systems to protect crypto keys. CRI recently extended its market reach significantly, licensing its technology to giant chip maker Infineon, which produces hundreds of millions of chips annually. The deal brings CRI's anti-DPA technology into the vast European smart card market.

"DPA has been a significant issue for a while," says Paul Kocher, CRI president and chief scientist, "but the number of chips and importance of those chips is growing, along with general advancement in technology. Now you've got about 2 billion chips being produced annually. The economic importance and security of those chips is very high."


This was first published in October 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: