Abstract | ||
---|---|---|
With the advent of side-channel analysis, implementations of mathematically secure ciphers face a new threat: by exploiting the physical characteristics of a device, adversaries are able to break algorithms such as AES or Triple-DES (3DES), for which no efficient analytical or brute-force attacks exist. In this paper, we demonstrate practical, noninvasive side-channel attacks on the Mifare DESFire MF3ICD40 contactless smartcard, a 3DES-based alternative to the cryptanalytically weak Mifare Classic [9,25]. We detail on how to recover the complete 112-bit secret key of the employed 3DES algorithm, using non-invasive power analysis and template attacks. Our methods can be put into practice at a low cost with standard equipment, thus posing a severe threat to many real-world applications that employ the DESFire MF3ICD40 smartcard. |
Year | Venue | Keywords |
---|---|---|
2011 | CHES | 112-bit secret key,noninvasive side-channel attack,contactless smartcard,mifare desfire,new threat,cryptanalytically weak mifare classic,real world,severe threat,non-invasive power analysis,brute-force attack,side-channel analysis,templates |
Field | DocType | Volume |
Power analysis,Computer science,Computer security,Smart card,Implementation,Template | Conference | 6917 |
ISSN | Citations | PageRank |
0302-9743 | 58 | 2.79 |
References | Authors | |
18 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
David Oswald | 1 | 240 | 20.38 |
Christof Paar | 2 | 3794 | 442.62 |