Author/Authors :
Ren, Yanting Tsinghua National Laboratory for Information Science - Technology(TNList) and the Institute of Microelectronics - Tsinghua University , Wu, Liji Tsinghua National Laboratory for Information Science - Technology(TNList) and the Institute of Microelectronics - Tsinghua University , Li, Hexin China Information Technology Security Evaluation Center (CNITSEC) , Li, Xiangyu Tsinghua National Laboratory for Information Science - Technology(TNList) and the Institute of Microelectronics - Tsinghua University , Zhang, Xiangmin Tsinghua National Laboratory for Information Science - Technology(TNList) and the Institute of Microelectronics - Tsinghua University , Wang, An School of Computer Science & Technology - Beijing Institute of Technology , Chen, Hongyi Tsinghua National Laboratory for Information Science - Technology(TNList) and the Institute of Microelectronics - Tsinghua University
Abstract :
The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.
Keywords :
side-channel analysis , key recovery , power analysis , CPU smart cards , Triple Data Encryption Standard (3DES)