Smart cards play it safe

 

Connecting state and local government leaders

The new FIPS 140-3 standard is expected to help secure smart-card encryptors against power analysis.

The latest revision of the Federal Information Processing Standard for cryptographic modules is a year overdue, but a draft should be out soon.'It's going through our regular release review,' before being presented for a 90-day comment period, said Ray Snouffer, manager of the security testing and metrics group at the National Institute of Standards and Technology.The third iteration of the standard, FIPS 140-3, contains the usual sorts of updates and clarifications that every maturing standard undergoes, but it also tackles a novel problem of growing concern ' protecting smart cards from power analysis attacks. In those attacks, a hacker reads the power fluctuations in a working cryptographic module to crack its code.Power analysis was a relatively new technique for cracking codes in single-chip processors when the last version of FIPS, FIPS 140-2, was approved in 2001, said Stan Kladko, director of the FIPS validation lab at BKP Security Labs. 'At that time, there was not enough time to include it' in the standard.Today, though, 'this is one of the bread-and-butter attacks,' said Paul Kocher, president of Cryptography Research.Power analysis was first described in 1999 by Kocher, along with researchers Joshua Jaffe and Benjamin Jun.'Immediately, a number of smart cards were compromised,' Kladko said. All that is required is an oscilloscope, access to a smart card and reader, 'and one week of work will get you the key.'The hacker must get access to the power line source going into the chip or to an output pin to measure the power fluctuation. 'The voltage in that pin will sag as power consumption increases,' Kocher said.Feeding the voltage into an oscilloscope gives a visual output that can be correlated with the input and output of the processor. This is simple power analysis that works if you can get a simple one-to-one correlation between power consumption and the bits the processor is using.If the correlation is not so simple, there is a more complex differential power analysis, which uses statistical analysis with a much larger group of measurements and statistical techniques to separate the signal from the noise and pull out the key.Power analysis works with single-chip processors, including smart cards, and there are a growing number of government smart cards with cryptography. The Defense Department has issued more than 10 million Common Access Cards, and civilian agencies are supposed to be ramping up to replace millions more traditional identification cards with the Personal ID Verification smart card mandated in Homeland Security Presidential Directive 12.Also, smart cards are not the only devices at risk. TV set-top boxes, game consoles, Blu-ray players, 'anything that has a chip that has a crypto key inside' is vulnerable, industry experts say.Theoretically, an analysis of a single chip could let you quickly read the key of any identical chip. The odds of any two chips being identical are pretty small. But analyzing the power consumption of one chip could dramatically cut the amount of analysis needed to crack subsequent chips built to the same standard.Simple and differential power analysis get a mention in the current FIPS 140-2 under 'other attacks,' but protection against them is not required.'We looked at this back when 140-2 was developed, and at that time it was fairly new,' Snouffer said. 'We understand it a little better now.'The current standard grew out of Federal Standard 1027, General Security Requirements for Equipment, which used the now-outdated Data Encryption Standard. FIPS 140-1 was issued in 1994, with a requirement that it be reviewed every five years. The review and revision process can take several years, and FIPS 140-2 was approved in 2001.Preparations for reviewing that version began at NIST in September 2004, by which time advances in technology were making it obsolete. A request for comments on FIPS 140-2 was published in January 2005, and the original timeline, which had slipped somewhat, called for FIPS 140-3 to be approved by May 2006 and for FIPS 140-2 to be retired in May 2007, although products validated under that standard still could be used.The starting point for the new draft is the implementation guidance for the standard that has been published. 'We also look at how technology has changed in the last five years,' Snouffer said.The changes that have made power analysis of interest for the new version are not so much in the technology for cracking keys, as in the ability of laboratories to accurately evaluate the effectiveness of countermeasures.'We only specify requirements where there is a test available,' Snouffer said.Many cryptographic implementations now employ countermeasures against power analysis, and the technology for evaluating them now is now available, Kladko said.'It's pretty simple, actually,' he said. 'We do FIPS evaluation as a separate business, but we do power analysis for customers. We submitted a draft proposal to NIST for the metrics for testing' that would use a signal-to-noise ratio.The way to protect against this is to introduce randomness, or noise, to the process. This can be done by introducing additional power to the circuits, randomly skipping some CPU cycles or by breaking a process up and having it performed on a variety of circuits.As with any security measures, nothing is perfect, and there is a trade-off. Any form of noise injected into the system will affect the chip's power consumption and/or performance.'It could easily degrade performance by a factor of two,' Kladko said.But this is not necessarily a significant impact, Kocher said.'For most implementations, it's not performance you are concerned with, it's security,' he said. 'And if computation time goes from 1 millisecond to 2 milliseconds, nobody's going to notice.'But even with additional noise, no system is going to be foolproof. With enough samples to work with and enough analysis, 'the noise is going to fall away,' leaving a signal that can be evaluated, Kocher said.But the additional time, effort and equipment required to do this analysis raises the bar for a would-be hacker.Frequently changing keys makes the attack even less attractive.'We're expecting to see this type of technique become prevalent in government cryptography because of the FIPS requirement,' Kocher said.Because absolute security is impossible, BKP Security recommended to NIST that the standard in FIPS 140-3 be protection of keys against cracking from a single power measurement.Security is not free, and neither is certification. BKP Security estimated that equipment cost to a testing lab would be minimal, probably no more than $5,000 for a digital oscilloscope, although additional training for personnel probably would be needed. Power analysis testing would add $5,000 to $10,000 to the cost of evaluation ' about 20 percent of the total cost of FIPS 140-2 testing ' and would require one to two person-weeks of testing time.That is likely to be included in the price of admission to the federal crypto market in the near future.

KEEPING UP: Ray Snouffer says NIST has learned a lot about power analysis since the last standard, Federal Information Processing Standard 140-2, was approved in 2001.

Rick Steele











Power users

















NIST responds




















Trade-offs involved




















X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.