1. Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding Oracle Attack 2018 Attacks CHES Hardware
    Gildas Avoine, Loïc Ferreira
    [View PDF on tches.iacr.org]
    [Show BibTex Citation]

    @article{DBLP:journals/tches/AvoineF18,
    author = {Gildas Avoine and
    Lo{\"{\i}}c Ferreira},
    title = {Attacking GlobalPlatform SCP02-compliant Smart Cards Using a Padding
    Oracle Attack},
    journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
    volume = {2018},
    number = {2},
    pages = {149--170},
    year = {2018},
    url = {https://doi.org/10.13154/tches.v2018.i2.149-170},
    doi = {10.13154/tches.v2018.i2.149-170},
    timestamp = {Tue, 05 Jun 2018 15:05:26 +0200},
    biburl = {https://dblp.org/rec/bib/journals/tches/AvoineF18},
    bibsource = {dblp computer science bibliography, https://dblp.org}
    }

We describe in this paper how to perform a padding oracle attack against the GlobalPlatform SCP02 protocol. SCP02 is implemented in smart cards and used by transport companies, in the banking world and by mobile network operators (UICC/SIM cards). The attack allows an adversary to efficiently retrieve plaintext bytes from an encrypted data field. We provide results of our experiments done with 10 smart cards from six different card manufacturers, and show that, in our experimental setting, the attack is fully practical. Given that billions SIM cards are produced every year, the number of affected cards, although difficult to estimate, is potentially high. To the best of our knowledge, this is the first successful attack against SCP02.

  1.