A comparison of cryptographic keycards
A comparison of cryptographic keycards
Posted Oct 17, 2017 18:14 UTC (Tue) by sagi (subscriber, #64671)Parent article: A comparison of cryptographic keycards
One angle I never see covered in smart card comparisons is susceptibility to emanation, ie. the quality of shielding (TEMPEST) against electromagnetic sidechannels.
Fox-IT has recently demonstrated the ability to sniff AES keys from an application processor with pretty cheap hardware. There is a lot of research by Daniel Genkin et. al., including against Curve25519. This makes me wonder about the risk trade-off for use on the go (e.g. laptop+smart card during travel, conferences). Could a smart card that protects key material against a compromised host leak that same key more easily by virtue of being less shielded and singularly purposed for secret computation? My own knowledge on this trade-off is very limited, perhaps someone else can enlighten me? Naturally these things depend on your threat model, but that does not stop my curiosity :-)
Posted Oct 18, 2017 10:57 UTC (Wed)
by hkario (subscriber, #94864)
[Link]
and while dedicated, top of the line, smart-cards are (claimed to be) more resistant to attacks and analysis like this, they are not invulnerable, and definitely are not perfect (they make be TEMPEST resistant but can create low entropy RSA keys...)
finally, if you are worried about such attacks, how do you plan to secure against rubber hose cryptanalysis?
A comparison of cryptographic keycards
