首页> 外文会议>European symposium on research in computer security >Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards
【24h】

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards

机译:小调整没有帮助:3G / 4G USIM卡中Milenage实现的差动功率分析

获取原文

摘要

Side-channel attacks are an increasingly important concern for the security of cryptographic embedded devices, such as the SIM cards used in mobile phones. Previous works have exhibited such attacks against implementations of the 2G GSM algorithms (COMP-128, A5). In this paper, we show that they remain an important issue for USIM cards implementing the AES-based MILENAGE algorithm used in 3G/4G communications. In particular, we analyze instances of cards from a variety of operators and manufacturers, and describe successful Differential Power Analysis attacks that recover encryption keys and other secrets (needed to clone the USIM cards) within a few minutes. Further, we discuss the impact of the operator-defined secret parameters in MILENAGE on the difficulty to perform Differential Power Analysis, and show that they do not improve implementation security. Our results back up the observation that physical security issues raise long-term challenges that should be solved early in the development of cryptographic implementations, with adequate countermeasures.
机译:侧通道攻击是加密嵌入式设备的安全性的越来越重要的关注,例如移动电话中使用的SIM卡。以前的作品已经表现出这种攻击对2G GSM算法的实现(COMP-128,A5)。在本文中,我们仍然表明,他们仍然是USIM卡实现3G / 4G通信中使用的基于AES的MILENAGE算法的重要问题。特别是,我们分析了各种运营商和制造商的卡的情况,并描述了几分钟内恢复加密密钥和其他秘密(克隆USIM卡所需的秘密的成功差分功率分析攻击。此外,我们讨论了在MILENAGE上对执行差分功率分析的难度的影响,并表明它们不会提高实现安全性。我们的结果备份了观察,即人身安全问题提高了应在加密实施的发展早期解决的长期挑战,充分的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号