everything you always wanted to know about smart cards... marc witteman november 2001

40
Everything you always wanted to know about Smart Cards... Marc Witteman <[email protected]> November 2001

Upload: alexia-gellings

Post on 29-Mar-2015

243 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Everything you always wanted to know about Smart Cards...

Marc Witteman

<[email protected]>

November 2001

Page 2: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Contents• Secure communication

– threats

– objective of cryptography

– cryptographic services, principles and algorithms

• Smart cards– concepts

– applications

– architecture

• Security– basic security features

– attacks

– counter measures

Page 3: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What are the threats ?

Confidentiality: unauthorized disclosuredisclosure of information

Integrity: unauthorized modificationmodification of information

Authenticity: unauthorized useuse of service

sender receiver

Page 4: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Objective of cryptography

• Giving trust in:– authenticity of message and/or sender

– integrity of message

– (sometimes) confidentiality of message

• by using an algorithm based on a secret shared between participants in a scheme.

Page 5: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Cryptographic servicesEncryption (confidentiality)

encryption decryptionmessage message

Key Key

Key= ?encryptionmessage

Key

encryption

MAC

MAC

message

= ?

Key

Challenge

encryption

Key

encryption

responseresponse

Message Authentication Codes (integrity)

Electronic signatures (authentication)

Page 6: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Cryptographic principles

• based on:– key secrecy

– strong algorithms

– difficult to guess key from message/ciphertext pairs

– sufficient key length (brute force)

• Kerckhoffs’ principle:– strength should reside in secrecy of key,

– not in secrecy of algorithm

Page 7: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Classical systems:

• transposition (mixing character sequence)

• substitution (changing characters)

• poly-alphabetic substitution (Viginere, Hagelin)

easily broken, using language statistics

Cryptographic algorithms (1)

Page 8: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Cryptographic algorithms (2)

Today two kinds of algorithms:

• repetitive permutations and substitutions of bits:– DES, 3-DES, IDEA, RC5, Blowfish …

– secret key

• mathematical calculations– RSA, Rabin, ElGamal, zero-knowledge, elliptic curve…

– public key

Page 9: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card concepts

A smart card:• can store data (e.g. profiles, balances, personal data) • provides cryptographic services (e.g. authentication,

confidentiality, integrity)• is a microcomputer• is small and personal• is a secure device

1234 5678 8910

Anne Doe

Page 10: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card application area’s

• Communication• Entertainment• Retail• Transportation• Health care

• Government• E-commerce• E-banking• Education• Office

Page 11: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card applications (1)

• Retail– Sale of goods

using Electronic Purses, Credit / Debit

– Vending machines

– Loyalty programs

– Tags & smart labels

• Communication– GSM

– Payphones

• Transportation– Public Traffic

– Parking

– Road Regulation (ERP)

– Car Protection• Entertainment

– Pay-TV

– Public event access control

Page 12: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card applications (2)

• Healthcare– Insurance data

– Personal data

– Personal file

• Government– Identification

– Passport

– Driving license

• E-commerce– sale of information

– sale of products

– sale of tickets, reservations

• E-banking– access to accounts

– to do transactions

– shares

Page 13: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card applications (3)

• Educational facilities– Physical access

– Network access

– Personal data (results)

– Copiers, vending machines, restaurants, ...

• Office– Physical access

– Network access

– Time registration– Secure e-mail & Web applications

Page 14: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card architecture

Vcc

Reset

Clock

Gnd

Vpp

I/O

Physical appearance:Credit card or SIM dimensionsContacts or contactless

Page 15: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPU

Central ProcessingUnit:

heart of the chip

Page 16: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPU

security logic

security logic

security logic:

detecting abnormal conditions,

e.g. low voltage

Page 17: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPU

serial i/ointerfaceserial i/ointerface

security logic

security logic

serial i/o interface:

contact to the outside world

Page 18: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPUtest logic

serial i/ointerfaceserial i/ointerface

security logic

security logic

test logic:

self-test procedures

Page 19: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPUtest logic

ROM

serial i/ointerfaceserial i/ointerface

security logic

security logic

ROM:

– card operating system– self-test procedures– typically 16 kbytes– future 32/64 kbytes

Page 20: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPU

RAM

test logic

ROM

serial i/ointerfaceserial i/ointerface

security logic

security logic

RAM:

‘scratch pad’ of the processor

typically 512 bytesfuture 1 kbyte

Page 21: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPU

RAM

test logic

ROM

EEPROMserial i/ointerfaceserial i/ointerface

security logic

security logic

EEPROM:

–cryptographic keys–PIN code–biometric template–balance–application code–typically 8 kbytes–future 32 kbytes

Page 22: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

What’s inside a smart card ?

CPU

RAM

test logic

ROM

EEPROMserial i/ointerfaceserial i/ointerface

security logic

security logic

databus databus:

connection between elements of the chip

8 or 16 bits wide

Page 23: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card chip

Page 24: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Basic smart card security features

• Hardware– closed package

– memory encapsulation

– fuses

– security logic (sensors)

– cryptographic coprocessors and random generator

• Software– decoupling applications and operating system

– application separation (Java card)

– restricted file access

– life cycle control

– various cryptographic algorithms and protocols

Page 25: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Smart card attacks

Internal Attacks

Side Channel Attacks

Logical Attacks

Page 26: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

InternalInternalAttacksAttacks

etching toolsMicroscopeProbe stationlaser cuttersScanning Electron MicroscopeFocussed Ion Beam Systemand more…….

Lab pictures provided by TNO

Page 27: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Reverse engineering

Page 28: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Staining of ion implant ROM array

Page 29: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Sub micron probe station

Page 30: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Probing with eight needles

Page 31: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

FIB: fuse repair

Page 32: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Internal attack counter measures

• Alarm (sensors)– light

– active grid

• Hide– feature size (< 300 nm)

– multi-layer

– buried bus

– bus scrambling

– shield

• Confuse– glue logic

– redundant logic

Page 33: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Logical attacks

CommunicationCommunication

Command scanFile system scanInvalid / inopportune requestsCrypt-analysis and protocol abuse

Page 34: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Logical attack counter measures• Command scan

– limit command availability

– restrict and verify command coding

– life cycle management

• File system scan– restrict file access

– test file access mechanisms (PIN. AUT, etc)

• Invalid / inopportune requests– exclude non-valid behaviour

– verify conformance

• Crypt analysis and protocol abuse– publish algorithms and initiate public discussion

– evaluate crypto algorithm and protocol

Page 35: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Side channelSide channel

AttacksAttacksUse of ‘hidden’ signals

electromagnetic emissionpower consumptiontiming

Insertion of signalspower glitcheselectromagnetic pulses

Page 36: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Power analysis

peak

slope

time

IIddqddq

area

shape

Page 37: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Power waveform

Page 38: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Fault injection on smart cards

Change a value read from memory to another value by manipulating the supply power:

Threshold ofread value A power dip at the

moment of reading amemory cell

Page 39: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Side channel attack counter measures

• Signal analysis– reduce processor signal by balancing or equalising the power and/or shielding the emission

– add noise to the processor activity (both in time and amplitude)

– eliminate timing relation with processed key and or data

– variable ordering of processes

– blinding of intermediate values with random values

– retry counters

– limited control and visibility of crypto input and output

• Signal insertion– use sensors for supply voltage, light and temperature

– double implementation path (for verification)

– check for runtime parameter validity

Page 40: Everything you always wanted to know about Smart Cards... Marc Witteman November 2001

Conclusions

• Smart card technology is emerging, applications are everywhere

• Smart cards enhance service and security• Perfect security does not exist, even not for smart cards• Risk analysis is essential

More info? Mailto: [email protected]