04.10.2013 Views

Smart Cards - CES

Smart Cards - CES

Smart Cards - CES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Logical Attacks<br />

Attacking <strong>Smart</strong> <strong>Cards</strong><br />

Logical attacks occur when a smart card is operating under<br />

normal physical conditions, but sensitive information is<br />

gained by examining the bytes going to and from the smart<br />

card.<br />

One example is the so-called "timing attack". In this attack,<br />

various byte patterns are sent to the card to be signed by the<br />

private key.<br />

Information such as the time required to perform the<br />

operation and the number of zeroes and ones in the input<br />

bytes are used to eventually obtain the private key.<br />

Folie 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!