Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Access Control: Smart Cards Under Attack – Literally

By Ken Warren
March 17, 2006
A lot rides on the security of smart cards. They open doors but also can open bank accounts as financial institutions move to the credential. Pictured from ACTIVCARD is ActivIdentity Solo version 2.0, an ultra-portable, slimly designed and easy to use personal smart card reader for secure banking.
 

It is no secret that smart cards have enjoyed explosive growth. Shipments are more than 1.5 billion globally, according to research firm Frost & Sullivan. There are scores of security applications such as payment systems, mobile phones, physical/logical access control, secure ID, public transit and pay TV, just to name a few. Value-added includes secure storage for personalized information such as ID keys or biometric data. In addition, costs for deploying customized smart cards have dropped significantly in recent years. When combining these factors it is no wonder many enterprises and their security operations have enthusiastically embraced smart cards.

The business bottom line: The primary reason for smart card success in the marketplace is simple – security. Smart cards are self-contained security units, which can provide unparalleled barriers to fraud and piracy.

But what if all smart cards were actually discovered to be insecure?

Even worse, what if attackers could unobtrusively defeat a smart card’s security using inexpensive equipment? Would governments, businesses and consumers continue to rely on them for critical transactions?

This is the threat the industry has faced since the late 1990s when scientists at my firm, Cryptography Research Inc., discovered a vulnerability called Differential Power Analysis. DPA is a power analysis attack, which attempts to compromise data on a device by monitoring the electrical activity of the chip. Realizing the impact that these fraudulent attacks could have, smart card vendors and issuers were informed of the vulnerability, and were provided with patent-pending countermeasure techniques to help ensure subsequent smart cards would be secure.

Today, most smart card standards mandate DPA resistance an important component of the system’s overall security requirements. DPA resistant techniques are available to smart card manufacturers and silicon providers under a DPA Countermeasure Licensing program represented by a “lock” logo.



Figure 2 shows an example of traces from a typical DPA analysis. The top trace is the reference (mean) signal; the lower traces show DPA traces where correlation is observed (correct key guess) and no correlation (incorrect key guess).

What is DPA?

At the fundamental level DPA is a power analysis attack, which attempts to compromise data on a device by measuring the electrical activity of the chip. All device operations and programming activity involve specific electrical activity at the transistor level, which can be accurately monitored as power consumption. The power trace, or “signature,” is a direct function of the particular operation being performed and data that is being processed.
 

Simple Power Analysis

The least complex technique is known as Simple Power Analysis. An SPA attack directly observes a device’s power consumption – a process that has been likened to monitoring a patient’s heart beat on an EKG. Analysis of the resulting power traces on a smart card can reveal information about which computational process is being employed, distinguish non-volatile memory programming, or identify cryptographic routines as they execute. By studying detailed features of a power trace, individual device instructions can be distinguished, and data dependant variations in program flow can be observed.

In particular, key-dependant power variations during cryptographic processing can reveal secret key values.

A device, which is vulnerable to SPA, can be compromised by the analysis of a single power trace captured during a normal transaction. What’s worse, the attack can be automated and completed in seconds by even relatively unsophisticated fraudsters. The good news is that effective countermeasures against SPA are relatively straightforward.



Figure 1 shows an SPA trace of an RSA operation. At the macro level the power trace clearly shows that the algorithm is using the Chinese Remainder Theorem. More detailed study of the power signal (inset) enables individual squaring and multiplication steps to be identified, thus revealing key data values. Sound complicated? Unfortunately, it’s not complicated enough.

Differential Power Analysis

DPA is a more complex and more powerful variation of SPA. With DPA many power traces are gathered, and statistical analysis and error correction techniques are used to extract information leaked across multiple operations. The robustness of these techniques allows very small differences in power consumption to be isolated, even when the signal level is a good deal smaller than the “noise” from other processes, measurement errors and even deliberate attempts to obscure the signal.

In a typical DPA attack, the smart card is monitored while performing a number of cryptographic operations, and power traces are recorded for each operation (typically this information is stored on a computer hard drive). After suitable signal processing the attacker uses the collection of sampled traces to test “guesses” about the key or other secret information. If the attacker makes a correct guess, there will be statistically significant correlation in the set of power traces, resulting in an identifiable DPA signal. If the guess is incorrect or if suitable countermeasures are present, than there will be no correlation of the traces and no DPA signal will be observed.

The attack is completed by making multiple guesses about the key information, and using the DPA process to verify or refute successive guesses.

DPA attacks can also be automated, though this process usually takes between several minutes and several hours to conduct. DPA countermeasures can involve a combination of hardware, software, protocol and crypto designs.



Implications of a DPA attack

At a fundamental level, all smart cards aim to ensure that a particular asset is used or accessed in an authorized or permitted manner. Software and cryptographic keys on the smart card are used to protect these assets. A successful SPA or DPA attack on the smart card provides an attacker with means to access, bypass or clone the authorization criteria for the assets protected by the card.

In contrast to most other attacks on smart cards, SPA and DPA are non invasive and inexpensive to repeat, and in many situations the cardholder would have no idea that a successful attack has taken place. Since smart cards are nearly always relied upon for their security merits, resistance to SPA and DPA attacks is essential for nearly all smart card applications.



Alliance info

More information on general smart card topics is from the Smart Card Alliance, a not-for profit, multi-industry association working to accelerate the widespread acceptance of multiple application smart card technology. Its membership includes leading companies in the banking, financial services, computer, telecommunications, technology, healthcare, retail, and entertainment industries, as well as a number of government agencies. The convergence of these major industry players is unprecedented and represents a shared vision and commitment to providing an interoperable platform for the delivery of a new generation of products and services based on smart card technology.

Check out the Alliance at www.smartcardalliance.org or go to www.securitymagazine.com and use the LINX search engine, powered by Google.



Links

  • Smart Card Alliance
  • Smart Card Alliance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ken Warren, based in Europe, represents Cryptography Research in its activities in the smart card industry, including support of the firm’s DPA countermeasure licensing and validation programs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • access card

    Trends & Technology Dictate ‘Smart’ Future for Access Control

    See More
  • Orange and white cards

    Proximity Cards Are a Liability: The Urgent Need to Modernize Access Control

    See More
  • Security key pad

    Villanova Tests Access Control with Smart Phones

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing