This is not a new attack. I have seen references to this dating back to 2000. Most silicon vendors of merit have been aware of this class of attacks and have countermeasures designed into their design. It is poor reporting on behalf of the press not to do thorough research for such an inflammatory story. Two that we use, Infineon and Atmel, are aware of the issue and are not susceptible.
Reid > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On > Behalf Of Kai McBride > Sent: Tuesday, May 14, 2002 9:02 AM > To: [EMAIL PROTECTED] > Subject: MUSCLE attacks on smartcards > > > > I believe one of the attacks David was referring to > is discussed in this article: > > http://story.news.yahoo.com/news?tmpl=story&ncid=76&e=1&cid=76&u=/ nyt/20020513/tc_nyt/vulnerability_is_discovered_in_security_for_smart_cards Apparently some University of Cambridge researchers have found a way to use a microscope and a common camera flash to isolate individual transistors actions on the card. To do this they have to remove the outer protective coating. Article is worth the read. -kmc -- Kai McBride | http://www.mumbleBunnies.org | mailto:[EMAIL PROTECTED] GnuPG Fingerprint: C00D ADFC 7D13 8C08 FEBF CA6A 3B4F 19CA FBCD D110 *************************************************************** Unix Smart Card Developers - M.U.S.C.L.E. (Movement for the Use of Smart Cards in a Linux Environment) http://www.linuxnet.com/ To unsubscribe send an email to [EMAIL PROTECTED] with unsubscribe sclinux *************************************************************** *************************************************************** Unix Smart Card Developers - M.U.S.C.L.E. (Movement for the Use of Smart Cards in a Linux Environment) http://www.linuxnet.com/ To unsubscribe send an email to [EMAIL PROTECTED] with unsubscribe sclinux ***************************************************************
