Contactless smart card performance analysis!

Smart card security controllers often suffer from a large number of hacking attacks. Recently, dramatic improvements in attack methods have announced the end of many previous designs claiming that their products are very secure. For high security chips such as passports originally designed to have a long design life, it is now also necessary to adopt the latest countermeasures to deal with. And need to accept the most extensive variety of tests.

It should be clearly distinguished that genuine RFID chips and RFID chips with standard microcontrollers and safety controllers are mainly used for item identification applications, which do not include microcontrollers. This kind of chip has limited functionality and safety measures. It can only be used for its specific application.

For contactless card applications, very high levels of privacy protection and data protection are required. The specially designed security controller is able to meet the advanced requirements of privacy protection and data protection for such applications.

From the perspective of various types of research, people are paying attention to the application of chip technology in the field of identification documents. However, most of the current discussion focuses on the practical application of electronic identification system technology. However, people must also pay attention to an aspect that is not easy to see (Up chip technology itself).

For semiconductor chips used in non-contact cards such as electronic identification cards or passports, the ability to protect stored data from unauthorized tampering must be designed. The hackers manipulate the data inside the chip to achieve illegal tampering. When the card itself has been tampered with. Hackers can make the content comply with the identity information of a country, so that the printed information and the information within the chip are consistent. Some identification systems can implement authentication functions, that is, reading devices can check the integrity and authenticity of information on an ID card or passport, and vice versa. This is called mutual authentication. For both applications, the security controller pair has a separate key for checking. but. Once this key is publicized, security will no longer exist. therefore. Such chips must also be able to protect their security authentication keys from being illegally read.

In short. The goal of chip manufacturers is to design effective, testable and identifiable security measures. To protect against the following three types of threats: mis-sensing attacks, physical attacks, and bypass channel attacks.

Semi-intrusion attack

Currently. The function of disrupting smart cards has evolved into a more sophisticated method of attack. Thousands of hackers from amateur to very professional use worldwide. Therefore, this kind of mis-sensing attack (also called as a semi-human invasion attack) has become the main object of security performance evaluation and verification of the security controller.

Smart card controllers are usually made of silicon chips. The electrical properties of silicon wafers vary with different environmental parameters. For example, the electrical properties of a silicon wafer will change with different voltages, temperatures, light, ionizing radiation, and changes in the surrounding electromagnetic field. The attacker will attempt to introduce some wrong behavior by changing these environmental parameters, including introducing errors into the program flow of the smart card controller. Typically, an attacker forces the chip to make erroneous decisions (such as receiving an incorrect input authentication code), allowing access to the confidential data in memory. This so-called "memory dump" is gradually becoming an area of ​​interest for error attacks.

However, for an attacker to extract a complete key using a complex algorithm, the use of "different error attack (DFA)" is only valid for some single erroneous operation in some cases. There are various methods for inducing unknown errors, including changing the power source, electromagnetic induction, illuminating the surface of the smart card with visible or radioactive materials, or changing the temperature. Some of the above methods can be implemented with very low cost devices, making them ideal for amateur attackers.

Although countermeasures against these attacks have been given in the safety controller data sheet. But only through actual testing can we prove whether these measures are really effective. Due to these countermeasures, the range of performance change is up to several orders of magnitude. Therefore, it is extremely important to check the safety level through independent evaluation and verification. Before the chip is approved for identification cards or e-passports, it must undergo extensive safety testing. However, the standards for these security tests are different for different identity card systems in the same family. The realization of the concept of error-induced attacks must be viewed from different perspectives, and a strict mutual cooperation mechanism must be constructed. The safety concept of Infineon’s advanced chip card controllers is based on the following three aspects:

1. Prevent error induction:
2. Error detection conditions;
3. Various measures against the wrong behavior of safety controllers.

Filter power and input signals as a first barrier, using a fast-response stabilizer to prevent a sudden change in the voltage of a given fan. Similarly, some irregularities in the clock power supply are also prevented. For example, if the security controller is attacked with a very high voltage that cannot be resisted only with the general rules. The sensor is used as part of the second barrier. If the sensor detects a critical value of the environmental parameters, an alarm will be triggered. The chip will be set to a safe state. The voltage sensor is used to check the power supply, the clock sensor checks for irregular frequency behavior, and the temperature and light sensors check for light and temperature attacks. South to light attack can be achieved through the back of the chip, the light sensor is effective on both sides of the device attack. The first barrier is established from the security controller core itself. Through the combination of hardware and software, an effective third barrier is formed. Here, the combination of hardware and software is crucial, because in some cases pure software measures are themselves the object of wrong attacks.

Controllable management layer attacks

The attacker may also control the circuit on the chip in a more direct way, for example, using electrical equipment to directly connect the signal lines on the microcontroller. To read the confidential data transmitted on the line or to inject the attacker's own data into the chip.

In order to deal with physical attacks, the most important thing is to encrypt the memory and bus system inside the chip. This means that the data on the chip itself must be encrypted with a strong cryptographic algorithm. This is even if the attacker can get this data, it can only produce useless information.

On the other hand, an effective shielded net can be used to constitute an effective barrier for attackers. In this case, micro-level ultra-fine protection lines are used to cover the safety controller. These protection lines are continuously monitored and if some lines are short-circuited, cut off or damaged, the alarm will be activated. With so many levels of protection, it is possible to protect the controller from physical attacks, even from advanced attack devices.

Bypass attack

Attackers also use methods to obtain confidential data information (eg, authentication codes), which is achieved by carefully observing various parameters while the chip is working. Using the power analysis (SPA - simple power and summer analysis. DPA - different power analysis. EMA - electromagnetic analysis), the attacker can extract information based on power consumption or electromagnetic radiation, depending on the type of operation and the chip The data processed in the different, power consumption and radiation intensity are varied.

Past, present, and future, consider that attackers will constantly change the attack method and even adopt newer technologies. It must be recognized that the effective protection of current and future attacks requires a complete set of security concepts. Therefore, Infineon decided to develop its own high-security processor core for the company's chip card. During technical research and product development as well as safety testing and verification, safety and product performance are optimized optimally. Although the decision to develop its own kernel is also related to other considerations, the usual advantages can be immediately reflected after the first security test is completed. Infineon uses the most advanced attack technology to thoroughly test its product's counter-attack measures and security performance. In order to prove the value of the target security level, independent security assessment and verification are also of utmost importance. The company's research on security methodologies and counter-attacks will never stop. The company is considering the evolution of future attack technologies, and by designing new security products to provide effective protection and future attack technologies.

Angle Bending Machine

China Angle Bending Machine Suppliers

HYDRAULIC Bending machine


Applicable Industry:Used for bending of angles in the field of steel tower industry.


The equipment possesses independent hydraulic power system and electric controlling system.

The hydraulic system uses the electromagnetic valve to reverse

Angle Bending Machine,Angle Iron Bender Machine,Angle Iron Bending Machine,Plate Bending Machine

Shandong EN FIN CNC Machinery Co., Ltd , https://www.sdfincncmachine.com