Log in
Register
Menu
Log in
Register
Home
What's new
Latest activity
Authors
Forums
New posts
Search forums
What's new
New posts
Latest activity
Members
Current visitors
New posts
Search forums
Menu
Log in
Register
Install the app
Install
Forums
Satellite Tv Encryption Decryption
Encryption Systems
Keys and Key editing
Smart Card Vulnerability
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="wolsty" data-source="post: 8210" data-attributes="member: 175166"><p>See www.iht.com/articles/57672.html for full text.</p><p></p><p>Two University of Cambridge computer security researchers on Monday were to detail an ingenious and inexpensive attack that employs a $30 camera flashgun and a microscope to extract secret information contained in widely used smart cards. "This vulnerability may pose a big problem for the industry," they wrote in their paper, "Optical Fault Induction Attacks." The researchers argued that the industry would need to add countermeasures to increase the cards' security. </p><p></p><p>The key is part of a two-key system that is used to encode and decode information. Typically, after the cardholder authenticates the card by supplying a personal identification number, the private key is used to encrypt the transaction. </p><p></p><p>The researchers found that they could interrupt the operation of the smart card's microprocessor simply by exposing it to an electronic camera flashbulb. They were able to expose the circuit to the light by scraping most of the protective coating from the surface of the microprocessor circuit that is embedded in each smart card.</p><p></p><p>With more study, the researchers were able to focus the flash on individual transistors within the chip by beaming the flash through a standard laboratory microscope. By sequentially changing the values of the transistors used to store information, they were able to "reverse engineer" the memory address map, allowing them to extract the secret information.</p></blockquote><p></p>
[QUOTE="wolsty, post: 8210, member: 175166"] See www.iht.com/articles/57672.html for full text. Two University of Cambridge computer security researchers on Monday were to detail an ingenious and inexpensive attack that employs a $30 camera flashgun and a microscope to extract secret information contained in widely used smart cards. "This vulnerability may pose a big problem for the industry," they wrote in their paper, "Optical Fault Induction Attacks." The researchers argued that the industry would need to add countermeasures to increase the cards' security. The key is part of a two-key system that is used to encode and decode information. Typically, after the cardholder authenticates the card by supplying a personal identification number, the private key is used to encrypt the transaction. The researchers found that they could interrupt the operation of the smart card's microprocessor simply by exposing it to an electronic camera flashbulb. They were able to expose the circuit to the light by scraping most of the protective coating from the surface of the microprocessor circuit that is embedded in each smart card. With more study, the researchers were able to focus the flash on individual transistors within the chip by beaming the flash through a standard laboratory microscope. By sequentially changing the values of the transistors used to store information, they were able to "reverse engineer" the memory address map, allowing them to extract the secret information. [/QUOTE]
Insert quotes…
Verification
Post reply
Forums
Satellite Tv Encryption Decryption
Encryption Systems
Keys and Key editing
Smart Card Vulnerability
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top