iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-540-24707-4_63
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks | SpringerLink
Skip to main content

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

  • 672 Accesses

Abstract

In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion. Futhermore, we proposes the smart card security evaluation criteria for side channel attacks about vulnerability assessment activities in Security Assurance Requirements. It can be useful to evaluate a cryptosystem related with information security technology and in addition, it can be applied to building smart card protection profiles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Anderson, R., Kuhn, M.: Tamper resistance- a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1–11 (1996)

    Google Scholar 

  2. CCIMB-2002-04-001-ASE(Draft v0.6), Security Target Evaluation Common Criteria and Methodology for Public Review, available on http://www.commoncriteria.org/review_docs/

  3. CCIMB-2002-07-001-AVA(Draft v0.68), Vulnerability Analysis and Penetration Testing, available on http://www.commoncriteria.org/review_docs/

  4. CCIMB-2002-11-003-AttackPotential(Draftv0.5), Characterisation of Attack Potential, available on http://www.commoncriteria.org/review_docs/

  5. http://www.commoncriteria.org/

  6. Common Criteria for Information Technology Security Evaluation; Smart Card Security User Group Smart Card Protection Profile ( SCSUG-SCPP ), Version 3.0 (September 2001)

    Google Scholar 

  7. EUROSMART-PP/0010, Protection Profile Smart Card IC with Multi-Application Secure Platform (ver. 2.0) (November 2000)

    Google Scholar 

  8. EUROSMART-PP/9911, Protection Profile Smart Card Integrated Circuit with Embedded Software (ver. 2.0)

    Google Scholar 

  9. EUROSMART BSI-PP-0002, Smartcard IC Platform Protection Profile (Version 1.0) (July 2001)

    Google Scholar 

  10. FIPS 140-2, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf

  11. FIPS 140-2 DTR, http://csrc.nist.gov/cryptval/140-1/fips1402DTR.pdf

  12. NESSIE, http://www.cosic.esat.kuleuven.ac.be/nessie/

  13. CRYPTREC, http://www.ipa.go.jp/security/

  14. Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)

    Google Scholar 

  15. Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  16. Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)

    Google Scholar 

  17. Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  18. Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144–157. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  19. Electronic Commerce Security Technology Research Association, Multi- Application Secure System LSI Chip Protection Profile, JICSAP ver 2.0 Protection Profile part 1, available on http://www.ssi.gou.fr/fr/confiance/documents/PP0301.pdf (June 6, 2003)

  20. McGovern, D.E.: Developing Protection Profiles Getting Started, available on http://www.acsac.org/2000/presentations/mcgovern.pdf , 16th ACSAC December 14 (2000)

  21. Joint Interpretation Library, Integrated Circuit Hardware Evaluation Methodology - Application of Attack Potential to Smartcards, at Version 1.0 (March 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, H., Ahn, M., Lim, S., Moon, S. (2004). A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_63

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics