Examining Smart-Card Security under the Threat of Power Analysis Attacks

  • Authors:
  • Thomas S. Messerges;Ezzat A. Dabbish;Robert H. Sloan

  • Affiliations:
  • Motorola Labs, Schaumburg, IL;Motorola Labs, Schaumburg, IL;Univ. of Illinois at Chicago, Chicago, IL

  • Venue:
  • IEEE Transactions on Computers
  • Year:
  • 2002

Quantified Score

Hi-index 14.99

Visualization

Abstract

This paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and develop an approach to model the signal-to-noise ratio (SNR). We show how this SNR can be significantly improved using a multiple-bit attack. Experimental results against a smart-card implementation of the Data Encryption Standard demonstrate the effectiveness of our multiple-bit attack. Potential countermeasures to these attacks are also discussed.