Beruflich Dokumente
Kultur Dokumente
Contents
Secure communication
threats objective of cryptography cryptographic services, principles and algorithms
Smart cards
concepts applications architecture
Security
basic security features attacks counter measures
sender
receiver
Confidentiality: unauthorized disclosure of information Integrity: unauthorized modification of information Authenticity: unauthorized use of service
Objective of cryptography
Giving trust in:
authenticity of message and/or sender integrity of message (sometimes) confidentiality of message
Cryptographic services
Encryption (confidentiality) Message Authentication Codes (integrity)
Key Key
message
encryption
Key
decryption
message MAC
Key
message
encryption
=?
MAC message
encryption
Challenge
Key
Key
encryption
encryption
response = ? response
Cryptographic principles
based on:
key secrecy strong algorithms difficult to guess key from message/ciphertext pairs sufficient key length (brute force)
Kerckhoffs principle:
strength should reside in secrecy of key, not in secrecy of algorithm
mathematical calculations
RSA, Rabin, ElGamal, zero-knowledge, elliptic curve public key
Communication
GSM Payphones
Transportation
Public Traffic Parking Road Regulation (ERP) Car Protection
Entertainment
Pay-TV Public event access control
E-commerce
sale of information sale of products sale of tickets, reservations
Government
Identification Passport Driving license
E-banking
access to accounts to do transactions shares
Office
Physical access Network access Time registration Secure e-mail & Web applications
Vpp
I/O
CPU
security logic
CPU
test logic
CPU
CPU
RAM
CPU
RAM EEPROM
databus CPU test logic ROM security logic serial i/o interface RAM EEPROM
Software
decoupling applications and operating system application separation (Java card) restricted file access life cycle control various cryptographic algorithms and protocols
Logical Attacks
Internal Attacks
etching tools Microscope Probe station laser cutters Scanning Electron Microscope Focussed Ion Beam System and more.
Reverse engineering
Hide
feature size (< 300 nm) multi-layer buried bus bus scrambling shield
Confuse
glue logic redundant logic
Logical attacks
Communication
Command scan File system scan Invalid / inopportune requests Crypt-analysis and protocol abuse
Side channel
Attacks
Use of hidden signals
electromagnetic emission power consumption timing
Insertion of signals
power glitches electromagnetic pulses
Power analysis
peak
shape slope
Iddq
area
time
Power waveform
Change a value read from memory to another value by manipulating the supply power:
Signal insertion
use sensors for supply voltage, light and temperature double implementation path (for verification) check for runtime parameter validity
Conclusions
Smart card technology is emerging, applications are everywhere Smart cards enhance service and security Perfect security does not exist, even not for smart cards Risk analysis is essential
More info? Mailto: info@riscure.com