Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (4): 64-72.doi: 10.11959/j.issn.2096-109x.2016.00044

• Papers • Previous Articles     Next Articles

Differential fault analysis on EMV application cryptogram

Qian PENG,Zeng-ju LI,Ru-hui SHI   

  1. National Financial IC Card Test Center,Beijing 100070,China
  • Revised:2016-03-27 Online:2016-04-01 Published:2016-05-25
  • Supported by:
    National Science and Technology Major Project(2014ZX01032401)


The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using safe-error attack.The differential fault attack model and steps to implement the attack were proposed,two key factors(the probability of generating wrong key and the probability of collision happening) affecting an attacking result were analyzed.The theoretical result and simulation of the attack were given.The experiment results show that the two keys could be distinguished in a real attacking when the dif-ference of two key’s collision probability was bigger than 0.003 5.The dummy bits in the key will increase the dif-ference and make distinguishing easier.Finally,several countermeasures against the attack were proposed.

Key words: EMV, application cryptogram, collision attack, safe-error

CLC Number: 

No Suggested Reading articles found!