Smart Cards - CES
Smart Cards - CES
Smart Cards - CES
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Logical Attacks<br />
Attacking <strong>Smart</strong> <strong>Cards</strong><br />
Logical attacks occur when a smart card is operating under<br />
normal physical conditions, but sensitive information is<br />
gained by examining the bytes going to and from the smart<br />
card.<br />
One example is the so-called "timing attack". In this attack,<br />
various byte patterns are sent to the card to be signed by the<br />
private key.<br />
Information such as the time required to perform the<br />
operation and the number of zeroes and ones in the input<br />
bytes are used to eventually obtain the private key.<br />
Folie 48