Defeating the smartcard code-crackers

Smart as they are, the protective codes of smart cards can be cracked using off-the-shelf technology. But the latest secure chips developed by one European team may soon frustrate hackers and thieves. Produced using a new and much faster design process, these chips can withstand more attacks than before.

Some two million new smartcards are rolled out every month, so the encrypted personal data that people store on these cards must be safe. And to date it has been. Yet the security threat is growing, as the electronic devices capable of breaking the card codes become cheaper and more powerful.

"It takes little more than an oscilloscope and a standard PC to mount a digital attack on an unprotected smartcard," says Klaus-Michael Koch. He is coordinator of the IST project SCARD, which aims to increase the security of chips on smart cards.

With equipment like this and some know-how, attackers can expose the content that a smart card is supposed to protect. Using techniques such as side-channel analysis (SCA), they can reveal part of a secret key, notably by examining a chip's power leakage as it performs computations or by scrutinising its thermal or electromagnetic radiation. If the card's owner is the attacker, he or she could upload money to an electronic purse, access a satellite TV system for free or claim to be someone else.

Improved design flow
Under SCARD, the partners wanted to put together a 'design flow' that allows semi-automatic implementation of countermeasures. The design flow is the digital design of a chip – the specifications, modelling of performance, algorithms and functionality up until the stage when the chip developer can start the synthesizer and compiler. Typically, this design process is costly and may take several years.

In-chip countermeasures must be included during the design period. They cannot be simulated, so developers must experiment with the shielding of a card's chip to limit temperature and voltage variations, or they must laboriously place transistors on it by hand.

For the hardware security issue, the partners developed prototypes of a design flow and carried out chip testing. They also paved the way for an automatic chip design process which would allow other companies to develop new and more secure chips.

"We succeeded in making the hardware more secure against side-channel analysis (SCA)," says Koch. "The chip we built was used to deduce the measurability limits, enabling us to assess the sort of countermeasures necessary against differential power attacks."

Countermeasures mask chip contents
To tackle leaky circuits, the SCARD partners developed two main countermeasures. The first introduces circuits with constant power consumption, irrespective of the tasks being performed. Says Koch, "Each clock cycle has the same energy. But these circuits must be perfectly executed, since even a three or four percent difference in energy can be seen." The second involves adding random values to the chip, masking the circuit's real values. Noise could also be added, though this is not currently feasible in smartcards due to energy-loss restrictions.

They have also developed an eight-bit test chip, featuring both unprotected and (seven) protected versions of the same circuit. The chip includes a microcontroller, is fully programmable and has reduced leakage. It is also capable of resisting over 500,000 attempted measurements, as opposed to the 15,000-measurement threshold for an ordinary (unprotected) chip. As a result, researchers can for the first time directly compare the effect of certain countermeasures on unprotected or protected versions of the same circuit on the same chip.

"Our new chip is not one hundred percent secure," acknowledges Koch. "However, it is far more difficult to crack than existing unprotected versions and represents a quantum leap forward in security." Though the project is now over, further research will be conducted on the remaining 25 test chips.

The new chip was produced using the project's own design flow, taking just one year from specification to production. "We demonstrated that our chip design flow – our set of tools and methods – really works," he notes.

Patents applied for
Two partners, Institut für Angewandte Informationsverarbeitung und Kommunikationstechnologie (IAIK, Austria) and Infineon, have applied for international patents stemming from their project work. These include countermeasures with new secure logic styles that cover innovative transistor circuits. Some of the countermeasure technology developed is also being used in IAIK's security crypto-modules.

The project results are now being disseminated through teaching – since some of the project partners are universities or technical small and medium-sized enterprises. A recent workshop in Louvain-la-Neuve, Belgium, to present SCARD's results attracted some 100 security-industry experts.

Contact:
Klaus-Michael Koch
Director of Research and Development
Technikon Forschungs- und Planungsgesellschaft mbH
Richard-Wagner-Str. 7
A-9500 Villach
Austria
Tel: +43 424 223355
Fax: +43 424 223355-77
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Source: IST Results Portal

Most Popular Now

Health Fabric and Sandwell Council Secur…

Digital health company Health Fabric is preparing to work with Sandwell Council after learning that it has secured support from The Healthy Ageing Challenge. The company will work with public health...

Philips Highlights AI-Powered Precision …

Royal Philips (NYSE: PHG, AEX: PHIA), a global leader in health technology, showcases its award-winning AI-powered systems and solutions debuting at the European Congress of Radiology (ECR, July 13-17, Vienna...

Could a Computer Diagnose Alzheimer's Di…

It takes a lot of time - and money - to diagnose Alzheimer's disease. After running lengthy in-person neuropsychological exams, clinicians have to transcribe, review, and analyze every response in...

Siemens Healthineers Accelerates and Imp…

Siemens Healthineers presents functionalities powered by Artificial Intelligence (AI) that accelerate and improve Magnetic Resonance Imaging (MRI). The quality of MR imaging is defined by the trade-off between scan time...

Building the Right Foundations to Delive…

Opinion Article by Gary Birks, Gary Birks, General Manager, UK and Ireland, Orion Health. The latest strategy for health and care IT looks to build on what has been achieved over...

Using Technology to Support Primary Care

Opinion Article by Paul Bensley, Managing Director of Primary Care Cloud Telephony Specialist X-on. It is good to see the publication of this strategy [A plan for digital health and social...

A Machine Learning Model to Predict Immu…

Immunotherapy is a new cancer treatment that activates the body's immune system to fight against cancer cells without using chemotherapy or radiotherapy. It has fewer side effects than conventional anticancer...

Virtual Reality App Trial Shown to Reduc…

Results from a University of Otago, Christchurch trial suggest fresh hope for the estimated one-in-twelve people worldwide suffering from a fear of flying, needles, heights, spiders and dogs. The trial, led...

Two Leading CIOs Join the Highland Marke…

Two of the NHS' most dynamic chief information officers have joined Highland Marketing’s advisory board of NHS IT professionals and health tech industry experts. Ian Hogan, a CIO at the Northern...

Teaching AI to Ask Clinical Questions

Physicians often query a patient's electronic health record for information that helps them make treatment decisions, but the cumbersome nature of these records hampers the process. Research has shown that...

AI Analyses Neuron Changes to Detect whe…

A research group from Nagoya University in Japan has developed an artificial intelligence (AI) for analyzing cell images that uses machine learning to predict the therapeutic effect of drugs. Called...

MIT Engineers Develop Stickers that can …

Ultrasound imaging is a safe and noninvasive window into the body’s workings, providing clinicians with live images of a patient’s internal organs. To capture these images, trained technicians manipulate ultrasound...