+ All Categories
Home > Documents > Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Date post: 29-Mar-2015
Category:
Upload: alexia-gellings
View: 242 times
Download: 1 times
Share this document with a friend
Popular Tags:
40
Everything you always wanted to know about Smart Cards... Marc Witteman <[email protected]> November 2001
Transcript
Page 1: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Everything you always wanted to know about Smart Cards...

Marc Witteman

<[email protected]>

November 2001

Page 2: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Contents• Secure communication

– threats

– objective of cryptography

– cryptographic services, principles and algorithms

• Smart cards– concepts

– applications

– architecture

• Security– basic security features

– attacks

– counter measures

Page 3: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What are the threats ?

Confidentiality: unauthorized disclosuredisclosure of information

Integrity: unauthorized modificationmodification of information

Authenticity: unauthorized useuse of service

sender receiver

Page 4: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Objective of cryptography

• Giving trust in:– authenticity of message and/or sender

– integrity of message

– (sometimes) confidentiality of message

• by using an algorithm based on a secret shared between participants in a scheme.

Page 5: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Cryptographic servicesEncryption (confidentiality)

encryption decryptionmessage message

Key Key

Key= ?encryptionmessage

Key

encryption

MAC

MAC

message

= ?

Key

Challenge

encryption

Key

encryption

responseresponse

Message Authentication Codes (integrity)

Electronic signatures (authentication)

Page 6: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Cryptographic principles

• based on:– key secrecy

– strong algorithms

– difficult to guess key from message/ciphertext pairs

– sufficient key length (brute force)

• Kerckhoffs’ principle:– strength should reside in secrecy of key,

– not in secrecy of algorithm

Page 7: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Classical systems:

• transposition (mixing character sequence)

• substitution (changing characters)

• poly-alphabetic substitution (Viginere, Hagelin)

easily broken, using language statistics

Cryptographic algorithms (1)

Page 8: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Cryptographic algorithms (2)

Today two kinds of algorithms:

• repetitive permutations and substitutions of bits:– DES, 3-DES, IDEA, RC5, Blowfish …

– secret key

• mathematical calculations– RSA, Rabin, ElGamal, zero-knowledge, elliptic curve…

– public key

Page 9: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card concepts

A smart card:• can store data (e.g. profiles, balances, personal data) • provides cryptographic services (e.g. authentication,

confidentiality, integrity)• is a microcomputer• is small and personal• is a secure device

1234 5678 8910

Anne Doe

Page 10: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card application area’s

• Communication• Entertainment• Retail• Transportation• Health care

• Government• E-commerce• E-banking• Education• Office

Page 11: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card applications (1)

• Retail– Sale of goods

using Electronic Purses, Credit / Debit

– Vending machines

– Loyalty programs

– Tags & smart labels

• Communication– GSM

– Payphones

• Transportation– Public Traffic

– Parking

– Road Regulation (ERP)

– Car Protection• Entertainment

– Pay-TV

– Public event access control

Page 12: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card applications (2)

• Healthcare– Insurance data

– Personal data

– Personal file

• Government– Identification

– Passport

– Driving license

• E-commerce– sale of information

– sale of products

– sale of tickets, reservations

• E-banking– access to accounts

– to do transactions

– shares

Page 13: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card applications (3)

• Educational facilities– Physical access

– Network access

– Personal data (results)

– Copiers, vending machines, restaurants, ...

• Office– Physical access

– Network access

– Time registration– Secure e-mail & Web applications

Page 14: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card architecture

Vcc

Reset

Clock

Gnd

Vpp

I/O

Physical appearance:Credit card or SIM dimensionsContacts or contactless

Page 15: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPU

Central ProcessingUnit:

heart of the chip

Page 16: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPU

security logic

security logic

security logic:

detecting abnormal conditions,

e.g. low voltage

Page 17: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPU

serial i/ointerfaceserial i/ointerface

security logic

security logic

serial i/o interface:

contact to the outside world

Page 18: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPUtest logic

serial i/ointerfaceserial i/ointerface

security logic

security logic

test logic:

self-test procedures

Page 19: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPUtest logic

ROM

serial i/ointerfaceserial i/ointerface

security logic

security logic

ROM:

– card operating system– self-test procedures– typically 16 kbytes– future 32/64 kbytes

Page 20: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPU

RAM

test logic

ROM

serial i/ointerfaceserial i/ointerface

security logic

security logic

RAM:

‘scratch pad’ of the processor

typically 512 bytesfuture 1 kbyte

Page 21: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPU

RAM

test logic

ROM

EEPROMserial i/ointerfaceserial i/ointerface

security logic

security logic

EEPROM:

–cryptographic keys–PIN code–biometric template–balance–application code–typically 8 kbytes–future 32 kbytes

Page 22: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

What’s inside a smart card ?

CPU

RAM

test logic

ROM

EEPROMserial i/ointerfaceserial i/ointerface

security logic

security logic

databus databus:

connection between elements of the chip

8 or 16 bits wide

Page 23: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card chip

Page 24: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Basic smart card security features

• Hardware– closed package

– memory encapsulation

– fuses

– security logic (sensors)

– cryptographic coprocessors and random generator

• Software– decoupling applications and operating system

– application separation (Java card)

– restricted file access

– life cycle control

– various cryptographic algorithms and protocols

Page 25: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Smart card attacks

Internal Attacks

Side Channel Attacks

Logical Attacks

Page 26: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

InternalInternalAttacksAttacks

etching toolsMicroscopeProbe stationlaser cuttersScanning Electron MicroscopeFocussed Ion Beam Systemand more…….

Lab pictures provided by TNO

Page 27: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Reverse engineering

Page 28: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Staining of ion implant ROM array

Page 29: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Sub micron probe station

Page 30: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Probing with eight needles

Page 31: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

FIB: fuse repair

Page 32: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Internal attack counter measures

• Alarm (sensors)– light

– active grid

• Hide– feature size (< 300 nm)

– multi-layer

– buried bus

– bus scrambling

– shield

• Confuse– glue logic

– redundant logic

Page 33: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Logical attacks

CommunicationCommunication

Command scanFile system scanInvalid / inopportune requestsCrypt-analysis and protocol abuse

Page 34: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Logical attack counter measures• Command scan

– limit command availability

– restrict and verify command coding

– life cycle management

• File system scan– restrict file access

– test file access mechanisms (PIN. AUT, etc)

• Invalid / inopportune requests– exclude non-valid behaviour

– verify conformance

• Crypt analysis and protocol abuse– publish algorithms and initiate public discussion

– evaluate crypto algorithm and protocol

Page 35: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Side channelSide channel

AttacksAttacksUse of ‘hidden’ signals

electromagnetic emissionpower consumptiontiming

Insertion of signalspower glitcheselectromagnetic pulses

Page 36: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Power analysis

peak

slope

time

IIddqddq

area

shape

Page 37: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Power waveform

Page 38: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Fault injection on smart cards

Change a value read from memory to another value by manipulating the supply power:

Threshold ofread value A power dip at the

moment of reading amemory cell

Page 39: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Side channel attack counter measures

• Signal analysis– reduce processor signal by balancing or equalising the power and/or shielding the emission

– add noise to the processor activity (both in time and amplitude)

– eliminate timing relation with processed key and or data

– variable ordering of processes

– blinding of intermediate values with random values

– retry counters

– limited control and visibility of crypto input and output

• Signal insertion– use sensors for supply voltage, light and temperature

– double implementation path (for verification)

– check for runtime parameter validity

Page 40: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001.

Conclusions

• Smart card technology is emerging, applications are everywhere

• Smart cards enhance service and security• Perfect security does not exist, even not for smart cards• Risk analysis is essential

More info? Mailto: [email protected]


Recommended