Abstract | ||
---|---|---|
The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like RFID tags. Their resistance against power-analysis attacks has not been scrutinized so far. In this article, we provide first results of power-analysis attacks on an RFID device that implements ECDSA. To this end, we designed and implemented a passive RFID-tag prototype. The core element of the prototype is a low-power ECDSA implementation realized on 180 nm CMOS technology. We performed power and electromagnetic attacks on that platform and describe an attack that successfully reveals the private-key during signature generation. Our experiments confirm that ECDSA-enabled RFID tags are susceptible to these attacks. Hence, it is important that they implement countermeasures which prevent the forging of digital signatures. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-01957-9_32 | ACNS |
Keywords | Field | DocType |
rfid tag,ecdsa-enabled rfid tag,ecdsa implementation,passive rfid-tag prototype,rfid device,low-power ecdsa implementation,digital signature algorithm,attacking ecdsa-enabled rfid devices,signature generation,digital signature,power-analysis attack,rfid,elliptic curve cryptography,radio frequency identification,elliptic curve digital signature algorithm,power analysis,ecdsa | Elliptic Curve Digital Signature Algorithm,Authentication,Computer security,Computer science,CMOS,Implementation,Digital signature,Elliptic curve cryptography,Radio-frequency identification | Conference |
Volume | ISSN | Citations |
5536 | 0302-9743 | 12 |
PageRank | References | Authors |
0.68 | 15 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Hutter | 1 | 345 | 25.26 |
Marcel Medwed | 2 | 455 | 20.40 |
Daniel Hein | 3 | 176 | 14.54 |
Johannes Wolkerstorfer | 4 | 338 | 34.13 |