{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:48Z","timestamp":1740141768697,"version":"3.37.3"},"reference-count":13,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100003665","name":"National IT Industry Promotion Agency","doi-asserted-by":"publisher","award":["NIPA-2013-H0502-13-1074","71271210"],"award-info":[{"award-number":["NIPA-2013-H0502-13-1074","71271210"]}],"id":[{"id":"10.13039\/501100003665","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002642","name":"Korea University","doi-asserted-by":"publisher","award":["NIPA-2013-H0502-13-1074","71271210"],"award-info":[{"award-number":["NIPA-2013-H0502-13-1074","71271210"]}],"id":[{"id":"10.13039\/501100002642","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["NIPA-2013-H0502-13-1074","71271210"],"award-info":[{"award-number":["NIPA-2013-H0502-13-1074","71271210"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,3,1]]},"abstract":"<jats:p> Contactless smart cards are being widely employed in electronic passports, monetary payments, access control systems, and so forth, because of their advantages such as convenience and ease of maintenance. In this paper, we present a new side-channel attack method for contactless smart cards. This method exploits the information leakage stemming from electromagnetic disturbances (EMD). We also made a convenient and low-cost EMD reader board that performs side-channel attacks on contactless smart cards. In order to demonstrate that EMDs can become another information-leakage side channel, we have carried out side-channel analysis on a commercial contactless smart card that performs 128-bit ARIA encryptions, and we have been able to successfully find all 16 bytes of the ARIA key from the target device. From our experimental results, we conclude that the proposed EMD analysis yields better results than the conventional power analysis. <\/jats:p>","DOI":"10.1155\/2014\/142610","type":"journal-article","created":{"date-parts":[[2014,3,30]],"date-time":"2014-03-30T07:56:47Z","timestamp":1396166207000},"page":"142610","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards"],"prefix":"10.1177","volume":"10","author":[{"given":"Jaedeok","family":"Ji","sequence":"first","affiliation":[{"name":"Information Technology Team, Korea Testing Certification, 22 Heungan-daero 27 beon-gil, Gunpo-si, Gyeonggi-do 435-823, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1695-5103","authenticated-orcid":false,"given":"Dong-Guk","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Kookmin University, Jeongneung-Ro 77, SeongBuk-Gu, Seoul 136-702, Republic of Korea"}]},{"given":"Seokwon","family":"Jung","sequence":"additional","affiliation":[{"name":"Department of Information Security, Mokpo National University, 1666 Youngsan-ro, Chenggye-myeon, Muan-gun, Jeollanam-do 534-729, Republic of Korea"}]},{"given":"Sangjin","family":"Lee","sequence":"additional","affiliation":[{"name":"Graduate School of Information Security, Korea University, Anam-dong 5, Seongbuk-Gu, Seoul 136-701, Republic of Korea"}]},{"given":"Jongsub","family":"Moon","sequence":"additional","affiliation":[{"name":"Graduate School of Information Security, Korea University, Anam-dong 5, Seongbuk-Gu, Seoul 136-701, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2014,3,27]]},"reference":[{"key":"B1-2014-142610","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"B2-2014-142610","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1007\/978-3-540-74735-2_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","volume":"4727","author":"Carluccio D.","year":"2007"},{"key":"B3-2014-142610","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_22"},{"key":"B9-2014-142610","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10838-9_7"},{"key":"B10-2014-142610","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24691-6_32"},{"key":"B11-2014-142610","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25286-0_5"},{"volume-title":"Proceedings of the APTA ITS Best Practices Workshop: Electronic Payment Systems","author":"Peters F.","key":"B12-2014-142610"},{"first-page":"2663","volume-title":"Proceedings of the 16th Particle Accelerator Conference","author":"Ziomek C.","key":"B14-2014-142610"},{"volume-title":"Measuring Electro Magnetic Disturbance During ISO\/IEC, 14443 Chipcard Data Transmission, Application Note","year":"2007","author":"ROHDE&amp;SCHWARZ","key":"B6-2014-142610"},{"key":"B8-2014-142610","unstructured":"Messerges T. S.Power analysis attacks and countermeasures for cryptographic algorithms [Ph.D. dissertation]2000University of Illinois at Chicago"},{"key":"B5-2014-142610","volume-title":"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards","author":"Finkenzeller K.","year":"2004","edition":"2"},{"key":"B7-2014-142610","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"first-page":"21","volume-title":"Proceedings of the International Symposium on Electromagnetic Compatibility (EMC '09)","author":"Sugawara T.","key":"B16-2014-142610"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/142610","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/142610","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/142610","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T16:23:13Z","timestamp":1621182193000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/142610"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":13,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3,1]]}},"alternative-id":["10.1155\/2014\/142610"],"URL":"https:\/\/doi.org\/10.1155\/2014\/142610","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}