Power and em attacks on passive 13.56 MHz RFID devices

69Citations
Citations of this article
69Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

During the last years, more and more security applications have been developed that are based on passive 13.56MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the effectiveness of power and EM attacks on this kind of devices. It provides an overview of different measurement setups and it presents concrete results of power and EM attacks on two RFID prototype devices. The first device performs AES encryptions in software, while the second one performs AES encryptions in hardware. Both devices have been successfully attacked with less than 1 000 EM traces. These results emphasize the need to include countermeasures into RFID devices. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Hutter, M., Mangard, S., & Feldhofer, M. (2007). Power and em attacks on passive 13.56 MHz RFID devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4727 LNCS, pp. 320–333). Springer Verlag. https://doi.org/10.1007/978-3-540-74735-2_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free