Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for evaluating anti-side channel attack capability of USIM (Universal Subscriber Identity Module) card

A side-channel attack and channel attack technology, which is applied in the USIM card anti-side-channel attack ability evaluation method and its system field, can solve the problem of no USIM card anti-side-channel attack ability evaluation, etc., and achieve the effect of reducing complexity

Pending Publication Date: 2022-04-12
观源(上海)科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology helps evaluate how well a specific type of device called UICM cards can resist being hackled from other devices like USB tokens or wireless networks without having them become vulnerable over time due to attacks on these types of interfaces. It involves comparing different versions of this data for certain characteristics such as power consumption levels (power), frequency response patterns, etc., which are used during testing. By doing this, we aim to identify weaknesses in their ability to protect against various threats.

Problems solved by technology

This patented technical problem addressed by the patents describes how to assess if two different types of attacks against a specific type of smartcard called UICC Card are possible: One involves trying to guess what another person has been given their phone number without actually having them present themselves at home while they use these cards - known as Side Channel Attacking Criterion ("SCAC"). Another threat comes from simulating other people sending similar signals over wireless networks like WiFi. These challengings require evaluation of both sides of the secure connection between the chip embedded within the device itself and the external world.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for evaluating anti-side channel attack capability of USIM (Universal Subscriber Identity Module) card
  • Method and system for evaluating anti-side channel attack capability of USIM (Universal Subscriber Identity Module) card
  • Method and system for evaluating anti-side channel attack capability of USIM (Universal Subscriber Identity Module) card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0043] Example: such as figure 1 As shown, a scheduling system of a password resource pool of the present invention, by evaluating the energy trace information generated by the USIM card when it is attacked by a side channel, judges whether the USIM card has the ability to resist side channel attacks, and has the following steps,

[0044] Step 1. Interact with the USIM card through the side channel attack device to obtain the energy trace information when the USIM card is attacked;

[0045] Repeatedly send the authentication APDU with INS=0x88 to the USIM card, the length of the Data part is 34 bytes, and the field format is as follows: L1||RAND||L2||AUTN. Each field is set as follows: L1 is 1 byte, which is the length of RAND, which is set to 0x10; RAND is 16 bytes, which is set to a random number; L2 is 1 byte, which is the length of AUTN, which is set to 0x10; AUTN is 16 characters section, set to all 0; this process will return an error message because the input authenticat...

Embodiment 2

[0087] Embodiment 2: The difference with Embodiment 1 is: as image 3 as shown,

[0088] Step 1. Obtain the authentication instruction and IMSI in the USIM card by accessing the USIM card;

[0089] Step 2. Pre-collect the capability trace information of the USIM card and convert it into a capability trace curve;

[0090] Step 3, the preprocessing curve judges the 10-round calculation position of the AES algorithm of the USIM, and judges the first peak and the second peak;

[0091] Step 4. Officially collect the capability trace curves of the first peak and the second peak of the USIM card AES 10-round algorithm;

[0092] Step 5. Perform Resample resampling processing on the collected capability trace curve to reduce the total points of the curve to be analyzed;

[0093] Step 6. Perform Lowpass low-pass noise reduction processing on the resampled capability trace curve to eliminate the collected noise current and other interference information;

[0094] Step 7. For the low-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for evaluating the side channel attack resistance of a USIM (Universal Subscriber Identity Module) card, and the method comprises the steps: carrying out the interaction between a side channel attack device and the USIM card, and obtaining the energy trace information when the USIM card is attacked; energy trace information generated when the USIM card is attacked by the channel attack equipment is converted into an intuitive energy trace curve through the oscilloscope, and the intuitive energy trace curve is collected to obtain the energy trace curve; carrying out resampling, low-pass and alignment processing on the energy trace curve, and calculating to obtain a key Key and an OPC of the USIM card; and authenticating and verifying the key Key and the OPC, and if verification is correct, indicating that the USIM card is not strong in side channel attack resistance. According to the method, whether the USIM card has the capability of resisting the side channel attack or not is judged by evaluating the energy trace information generated when the USIM card is attacked by the side channel, so that the complexity of evaluating the side channel resisting process of the USIM card is greatly reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner 观源(上海)科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More