Detection of vulnerabilities and assessment of resistance to hacker attacks of smart cards and crypto processors with built-in protection

Over the past decade, in addition to methods for extracting secrets or performing other unauthorized actions, attackers began to use unintentional data leakage and manipulation of the program execution process through side channels.



Traditional attack methods can be expensive in terms of knowledge, time, and processing power. Side channel attacks, on the other hand, can be more easily implemented and non-destructive, as they reveal or control the physical properties that are available during normal functioning.



Using statistical methods for processing side channel measurements or by entering failures into the closed channels of a microcircuit, an attacker can gain access to its secrets within a few hours.



image



More than 5,000 million smart cards are issued annually, new built-in cryptographic technologies appear on the markets, so the need to ensure the security of both business and privacy is growing.



In the Netherlands, Riscue has created the Inspector system, which provides research laboratories as well as manufacturers with new, high-performance security threat detection tools.



The Inspector system supports various side channel analysis (SCA) methods such as power analysis (SPA / DPA), clock, radio frequency, and electromagnetic analysis (EMA) and disturbance attacks (FI) such as voltage failures, clock failures, and laser manipulation. The system’s built-in functions support numerous cryptographic algorithms, application protocols, interfaces, and instrumentation.



The system allows you to expand and implement new methods and proprietary applications for vulnerability detection.



The Inspector SCA side channel analysis system includes:




Among the main "goodies" can distinguish the main:




Inspector is available in various versions on a single platform:




Inspector SCA



After the measurement results are obtained, a variety of signal processing methods are available to form multiple traces with a high level of signals and a low noise level. Signal processing functions have been developed that take into account the subtle differences between electromagnetic trace signal processing, power consumption trace, and RF (RF) trace. Inspector’s powerful graphical trace presentation tools allow users to temporarily analyze or verify traces, for example, for SPA vulnerabilities.





DPA implementation with ECC implementation



For many security implementations that are nowadays considered SPA-resistant, the focus of testing is usually on differential test methods (i.e. DPA / CPA ). To this end, Inspector offers a wide range of configurable methods regarding a large number of cryptographic algorithms and widely used algorithms such as (3) DES, AES, RSA and ECC.





EM radiation from the chip to find the best location when implementing DEMA



Key Features




Hardware


In addition to the workstation, the PC Inspector SCA uses hardware optimized for side channel data and signal collection:





Evaluated objects often require measurements, switching, and hardware controls that are required to perform SCA. The Inspector’s flexible hardware manager, open development environment and broad interface options provide a solid foundation for high-quality measurements using user equipment.





Inspector SCA



Joh John Connor, lead internal security engineer, speaks of the system as follows:

“The Inspector has fundamentally changed the way we evaluate the resilience of our products to a differential energy attack differential DPA. Its strength lies in the fact that it integrates the collection and analysis processes that allow us to quickly evaluate the effectiveness of new cryptographic hardware projects. Moreover, its excellent graphical interface allows the user to visualize power signatures from collected discrete data individually or simultaneously - which is invaluable when preparing data for DPA during an attack - while its powerful analytic libraries support the most commonly used commercial encryption algorithms. Riscure’s timely software and technology updates help us keep our products safe. ”



Inspector fi



Inspector FI - Fault Injection - offers a wide range of features to perform fault testing on smart cards and embedded devices. Supported test methods include clock failures, voltage failures, and optical attacks using laser equipment. Failure attacks - also known as disturbance attacks - modify the behavior of the chip, causing usable failure.



Using the Inspector FI, users can test whether it is possible to extract the key by causing failures in the cryptographic operations of the chip, bypass a check such as authentication or the life cycle state, or change the program execution process on the chip.



Extensive configurable options


Inspector FI includes a large number of user-configurable parameters for programmatically controlling switching and disturbances, such as peak pulses of different durations, pulse repetition, and voltage level changes. The software presents the results, showing expected behavior, card discards, and unexpected behavior, along with detailed logging. DFA attack modules are available for basic encryption algorithms. Using a “wizard”, users can also create a custom perturbation program with an API.



Key Features




Hardware


Inspector FI can be used with the following hardware components to conduct attacks:







Inspector FI with VC Glitcher fault generator, icWaves trigger generator, Glitch Amplifier and Laser Station



The VC Glitcher generates the core of the Inspector system failover architecture. Using ultra-fast FPGA technology, faults of just two nanoseconds can be generated. The hardware has a user-friendly programming interface. The crash program created by the user is loaded into the FPGA before the test run. The VC Glitcher includes an integrated circuit for introducing voltage and clock faults, as well as a channel output for controlling the laser station.



The diode laser station consists of a special set of high-power diode lasers with custom-made optics, which are quickly and flexibly controlled by the VC Glitcher. The equipment takes optical testing to a new level, providing effective multiple failures, precise control of power consumption and a quick and predictable response for switching pulses.



By updating the diode laser station to the multi-drop version, several areas can be tested on the chip using various parameters for synchronization and supply voltage.



Signal-based triggering using icWaves trigger pulse generator


Clock jitter, random process interruptions, and data-dependent process durations require flexible failover and side-channel data collection. The Inspector icWaves generator generates a trigger pulse in response to real-time detection of differences from a given model in the power supply of the microcircuit or EM signal. The device includes a special narrow-band filter to ensure detection of model matching even with a noisy signal.



The reference trace used to match the model inside the FPGA-based device can be modified using the Inspector signal processing functions. A smart card that detects a malfunction can initiate a security mechanism to remove sensitive data or block the card. The icWaves component can also be used to initiate a shutdown of the card each time the power consumption or EM profile deviates from standard operation.





Laser Station Laser Station (LS) with Multipoint Access,

with microscope and coordinate table



Integrated Development Environment (IDE)



The Inspector development environment is designed to provide maximum flexibility to the user using SCA and FI for any purpose.







Inspector fi



Inspector combines failover and side channel analysis techniques in one high-performance package.



An example of failure behavior analysis:







The area of ​​attack through side channels is developing rapidly, and new research results are published every year, become well-known or make certification of schemes and standards mandatory. Inspector allows users to keep abreast of new developments and regular software updates that implement new methods.



All Articles