Power and em attacks on passive 13.56 MHz RFID devices

  • Hutter M
  • Mangard S
  • Feldhofer M
  • 45

    Readers

    Mendeley users who have this article in their library.
  • 47

    Citations

    Citations of this article.

Abstract

During the last years, more and more security applications have been developed that are based on passive 13.56MHz RFID devices. Among the most prominent applications are electronic passports and contactless payment systems. This article discusses the effectiveness of power and EM attacks on this kind of devices. It provides an overview of different measurement setups and it presents concrete results of power and EM attacks on two RFID prototype devices. The first device performs AES encryptions in software, while the second one performs AES encryptions in hardware. Both devices have been successfully attacked with less than 1 000 EM traces. These results emphasize the need to include countermeasures into RFID devices. © Springer-Verlag Berlin Heidelberg 2007.

Author-supplied keywords

  • AES
  • DEMA
  • DPA
  • EM attacks
  • Power analysis
  • RFID
  • Side-channel attacks

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document

Authors

  • Michael Hutter

  • Stefan Mangard

  • Martin Feldhofer

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free