Key recovery against 3DES in CPU smart card based on improved correlation power analysis

7Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining information leaked from two adjacent clock cycles. Using our laboratory-based power analysis system, we verified the proposed key recovery solution by performing a successful correlation power analysis on a Triple Data Encryption Standard (3DES) hardware module in a real-life 32-bit CPU smart card. All 112 key bits of the 3DES were recovered with about 80 000 power traces.

Cite

CITATION STYLE

APA

Ren, Y., Wu, L., Li, H., Li, X., Zhang, X., Wang, A., & Chen, H. (2016). Key recovery against 3DES in CPU smart card based on improved correlation power analysis. Tsinghua Science and Technology, 21(2), 210–220. https://doi.org/10.1109/TST.2016.7442503

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free