This is not a new attack.  I have seen references to this dating back to
2000.  Most silicon vendors of merit have been aware of this class of
attacks and have countermeasures designed into their design.  It is poor
reporting on behalf of the press not to do  thorough research for such an
inflammatory story.  Two that we use, Infineon and Atmel, are aware of the
issue and are not susceptible.

Reid


> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On
> Behalf Of Kai McBride
> Sent: Tuesday, May 14, 2002 9:02 AM
> To: [EMAIL PROTECTED]
> Subject: MUSCLE attacks on smartcards
>
>
>
> I believe one of the attacks David was referring to
> is discussed in this article:
>
> http://story.news.yahoo.com/news?tmpl=story&ncid=76&e=1&cid=76&u=/
nyt/20020513/tc_nyt/vulnerability_is_discovered_in_security_for_smart_cards

Apparently some University of Cambridge researchers have found
a way to use a microscope and a common camera flash to isolate
individual transistors actions on the card. To do this they have
to remove the outer protective coating.

Article is worth the read.

-kmc
--
Kai McBride  |  http://www.mumbleBunnies.org  |  mailto:[EMAIL PROTECTED]
GnuPG Fingerprint:      C00D ADFC 7D13 8C08 FEBF  CA6A 3B4F 19CA FBCD D110




***************************************************************
Unix Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/
To unsubscribe send an email to [EMAIL PROTECTED] with
unsubscribe sclinux
***************************************************************



***************************************************************
Unix Smart Card Developers - M.U.S.C.L.E.
(Movement for the Use of Smart Cards in a Linux Environment)
http://www.linuxnet.com/
To unsubscribe send an email to [EMAIL PROTECTED] with
unsubscribe sclinux
***************************************************************

Reply via email to