How to Steal a Global
Company's Business by
Breaking Into Just One
of Their Devices

Mitigate the risk and protect your hardware against
side-channel attacks on secure element.

Thank You!

Mail icon
START READING

Use of cryptographic keys, which may be algorithmically unbreakable, does not necessarily protect devices from other security threats and attacks, such as Differential Power Analysis (DPA), Differential Electromagnetic Analysis (DEMA), Fault Injection Analysis (FIA), and other side-channel attacks.

Side-channel attacks are relatively easy and inexpensive to mount against cryptographically protected devices but are notoriously difficult to defend against. In this paper, we discuss DPA attacks on smart cards with embedded microchips and external electrical contacts. Smart cards are ubiquitous: cable and satellite Pay-TV, ATM and debit/credit cards, cellular SIMs, etc.

Hackers found ways of breaking into smart cards, stealing money, using paid services for free, and gaining unauthorized access. A new approach to protecting smart cards against DPA attacks is described, allowing manufacturers to cut protection costs and save time during development.