Continue to Site

Welcome to EDAboard.com

Welcome to our site! EDAboard.com is an international Electronics Discussion Forum focused on EDA software, circuits, schematics, books, theory, papers, asic, pld, 8051, DSP, Network, RF, Analog Design, PCB, Service Manuals... and a whole lot more! To participate you need to register. Registration is free. Click here to register now.

"Reverse engineering" and encyription

Status
Not open for further replies.

serimc

Junior Member level 2
Joined
Jan 7, 2005
Messages
21
Helped
0
Reputation
0
Reaction score
0
Trophy points
1,281
Activity points
255
security of smart card

Hi to all
This is my first topic ,please help me,
I want o learn about reverse engineering.Some illegal persons dumb all data in smart cards.And find algorithm in the smart cards.
I am asking these,Be sure, that not for illegal purposes for my university project.
I am searching that how can illegal persons can hack the dvb encyription systems(viacces,irdeto,seca...).How can we prevent the systems.What is the disadvantages of using smart cards.
I heard that they apply a current to smart card and looking under electron microscope.Is it true?What is its details..
Please tell me where can i find information about "reverse engineering" and their methods that apply to smart cards in deatils.
If you know please explain me and if you have any e-documents please send my mail:
serimc@gmail.com

thanks,
 

In the past there are many way to extract know-how from tampered device.

Today need an effort that only a million $ company can do.

In your example, smart card, today have a tamper evidece mechanism, and tamper proof shield.

In the past, you can decap the silicon using a special solvent and observe with microscope a memory map (the memory map in PROM or FLASH is visible by microscope. you can see if the gap is filled or not, or junction fused or not) also you can make a look for the hardware, and reverse it.

Today, the silicon is coverd after passivation, by a metal film, that can't be removed by solvent and if you try to remove it mechanically, you damage the silicon.

Also there are a tamper evidence mechanism that erase all memory if you try to decap it.

Also the secrets are stored in EEprom and this kind of memory contents is not visible by microscope.

Finally, the loose made by piracy, costrain the major to change protection and secret, frequently, then if you discover after many effort some secrets, the system will be changed befor your discovered it.

Today the mission to reverse smart-card is too hard for a home user or a hobbyst, but, as ever succeeded, there are many BUG in firmware or hardware and if you are luky you can discover one of this, and try to extract secret with this back door.

But unlikely, there are not standard backdoor, you need to find the particular backdoor of this hardware/firmware.

In many cases in the past, it is discoverd for fortuite issues, trying to do a legal action, and some users retrieved secrets.

For reverser the road is very difficult now.

Good Luck !!

bye
 

in the field of smart card, eeprom or flash or Rom contain the card operation system(COS), and card provider doed anything they can to prevent COS from exposing. Now there are many methods threatening the security of smart card , for example
dpa/spa, modified voltage and frequency of smart card...
 

Status
Not open for further replies.

Part and Inventory Search

Welcome to EDABoard.com

Sponsor

Back
Top