Smart Cards Vulnerable to Photo-Flash Attacks? 217
belphegor writes "Researchers at the University of Cambridge have
found a way to use a camera flash and microscope to extract data from smart cards. " Notable because its apparently relatively
simple to do and really throws a monkey wrench into a variety of businesses
that use smart cards to store important data.
No worries, we'll just pass more laws... (Score:5, Insightful)
Remember, when a security technology is comprimised you don't improve the technology, you outlaw anything that exposes its weakness.
At least they need to steal them first (Score:2, Insightful)
They were able to expose the circuit to the light by scraping most of the protective coating from the surface of the microprocessor circuit that is embedded in each smart card.
With more study, the researchers were able to focus the flash on individual transistors within the chip by beaming the flash through a standard laboratory microscope.
Could they make the cards so that removing the coating destroyed the chip?
don't write the PIN on the back of your smart card (Score:3, Insightful)
(quoting from the linked article)
"The Pentagon (news - web sites) has armed soldiers with smart cards for online identity and physical access...Some of the information stored in the card is in the form of a number composed of ones and zeros that cryptographers refer to as a "private key." That key is part of a two-key system that is used to encode and decode information. The security of such systems is compromised if the private key is revealed. Typically, after the card holder authenticates the card by supplying a pin number, the private key will then be used to encrypt any sort of transaction using the card."
I hope that this is a joke (Score:2, Insightful)
Denying problem (Score:2, Insightful)
I love how the smart card manufacturing companies are just denying that this is a problem and saying that they've already looked at that issue. Do you really think they feel that way and have covered this problem already, or off the record they are panicking to find a way to fix the problem? I would guess that this is new to them, but that they don't want to admit their cards are vulnerable.
BTW, The story is taken from the NY Times, so if you have problems getting to the Yahoo! version of the story, try this link:
http://www.nytimes.com/2002/05/13/technology/13SM
physical card access (Score:3, Insightful)
To do this he needs first to get physical access to the card, which is inside the phone (usually under battery). Having access to the phone, usually allow him to make calls anyway without complex card reading procedure.
Re:physical card access (Score:1, Insightful)
But then the owner knows the phone is missing and can cancel it. If you have physical access to a phone (somebody forgot it) and can clone it without their knowledge and return it, many more calls can be made.
We fixed it, but we can't tell you how! (Score:3, Insightful)
If it's secure, but only because noone knows how it works, then it's inherently *NOT* secure. When will they learn?
OBSCURITY IS NOT SECURITY
*sigh*
Um (Score:3, Insightful)
Jesus
Huh? (Score:1, Insightful)
Re:We fixed it, but we can't tell you how! (Score:3, Insightful)
Once again, someone taking a piece of truth and misapplying it.
Obscurity is an excellent additional layer of defence.
An example: Take any well known strong encryption, say Triple-DES. Thousands of people have spent thousands of hours studying it and analyized the best attacks against it. I guarantee some organizations have built special hardware to crack it. They grab a message, feed it into the NSA ultra-parallel computer and *BING* 24 hours later an answer pops out.
Now, lets say I use triple-DES but then I add a piece of crap insecure custom encryption on top. Heck, even a ROT-13 layer would cause dedicated hardware to barf. Now the million man-hours of triple-DES research and your billion-dollar super computer are completely useless until someone invests the time to crack my personal encryption layer. It doesn't matter if the "obscure" layer is insecure. If a million people use a million obscure custom encryptions, the time you invest breaking one does you no good when you get to the next.
Security through obscurity is only flawed when it is your primary line of defense.
-