Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack

Authors

  • Gildas Avoine Univ Rennes, INSA Rennes, CNRS, IRISA; Institut Universitaire de France
  • Loïc Ferreira Orange Labs, Applied Cryptography Group, Caen, France; Univ Rennes, INSA Rennes, CNRS, IRISA, France

DOI:

https://doi.org/10.13154/tches.v2018.i2.149-170

Keywords:

Security protocol, Padding oracle attack, GlobalPlatform, Smart cards, Timing side-channel

Abstract

We describe in this paper how to perform a padding oracle attack against the GlobalPlatform SCP02 protocol. SCP02 is implemented in smart cards and used by transport companies, in the banking world and by mobile network operators (UICC/SIM cards). The attack allows an adversary to efficiently retrieve plaintext bytes from an encrypted data field. We provide results of our experiments done with 10 smart cards from six different card manufacturers, and show that, in our experimental setting, the attack is fully practical. Given that billions SIM cards are produced every year, the number of affected cards, although difficult to estimate, is potentially high. To the best of our knowledge, this is the first successful attack against SCP02.

Published

2018-05-08

How to Cite

Avoine, G., & Ferreira, L. (2018). Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018(2), 149–170. https://doi.org/10.13154/tches.v2018.i2.149-170

Issue

Section

Articles