Abstract
In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the smart card and similar security evaluation criteria for smart card protection profiles based on the common criterion. Futhermore, we proposes the smart card security evaluation criteria for side channel attacks about vulnerability assessment activities in Security Assurance Requirements. It can be useful to evaluate a cryptosystem related with information security technology and in addition, it can be applied to building smart card protection profiles.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, R., Kuhn, M.: Tamper resistance- a cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1–11 (1996)
CCIMB-2002-04-001-ASE(Draft v0.6), Security Target Evaluation Common Criteria and Methodology for Public Review, available on http://www.commoncriteria.org/review_docs/
CCIMB-2002-07-001-AVA(Draft v0.68), Vulnerability Analysis and Penetration Testing, available on http://www.commoncriteria.org/review_docs/
CCIMB-2002-11-003-AttackPotential(Draftv0.5), Characterisation of Attack Potential, available on http://www.commoncriteria.org/review_docs/
Common Criteria for Information Technology Security Evaluation; Smart Card Security User Group Smart Card Protection Profile ( SCSUG-SCPP ), Version 3.0 (September 2001)
EUROSMART-PP/0010, Protection Profile Smart Card IC with Multi-Application Secure Platform (ver. 2.0) (November 2000)
EUROSMART-PP/9911, Protection Profile Smart Card Integrated Circuit with Embedded Software (ver. 2.0)
EUROSMART BSI-PP-0002, Smartcard IC Platform Protection Profile (Version 1.0) (July 2001)
FIPS 140-2, http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
FIPS 140-2 DTR, http://csrc.nist.gov/cryptval/140-1/fips1402DTR.pdf
CRYPTREC, http://www.ipa.go.jp/security/
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997)
Rao, J.R., Rohatgi, P.: The EM Side-Channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144–157. Springer, Heidelberg (1999)
Electronic Commerce Security Technology Research Association, Multi- Application Secure System LSI Chip Protection Profile, JICSAP ver 2.0 Protection Profile part 1, available on http://www.ssi.gou.fr/fr/confiance/documents/PP0301.pdf (June 6, 2003)
McGovern, D.E.: Developing Protection Profiles Getting Started, available on http://www.acsac.org/2000/presentations/mcgovern.pdf , 16th ACSAC December 14 (2000)
Joint Interpretation Library, Integrated Circuit Hardware Evaluation Methodology - Application of Attack Potential to Smartcards, at Version 1.0 (March 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, H., Ahn, M., Lim, S., Moon, S. (2004). A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_63
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_63
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive