<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: About PIN, the iPhone is about 20 years behind smart cards</title>
	<atom:link href="https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Thu, 18 May 2017 07:26:32 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>By: Marcos</title>
		<link>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/#comment-19362</link>
		<dc:creator><![CDATA[Marcos]]></dc:creator>
		<pubDate>Mon, 07 Dec 2015 07:17:10 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=17472#comment-19362</guid>
		<description><![CDATA[clever attack but not practical]]></description>
		<content:encoded><![CDATA[<p>clever attack but not practical</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Eric VÃ©tillard</title>
		<link>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/#comment-18924</link>
		<dc:creator><![CDATA[Eric VÃ©tillard]]></dc:creator>
		<pubDate>Wed, 01 Apr 2015 08:24:47 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=17472#comment-18924</guid>
		<description><![CDATA[You are right. There are many ways to defend against such attacks. When I started working on smart cards, developers were actively working on &quot;constant-time comparisons&quot;, which would take the same time and leave the same power trace independently of the comparison result. Eventually, scopes became so good that the tiny differences became visible.

The superiority of countermeasures like pre-decrement is that it beats a full category of attacks. Timing attacks just don&#039;t work any more.]]></description>
		<content:encoded><![CDATA[<p>You are right. There are many ways to defend against such attacks. When I started working on smart cards, developers were actively working on &#8220;constant-time comparisons&#8221;, which would take the same time and leave the same power trace independently of the comparison result. Eventually, scopes became so good that the tiny differences became visible.</p>
<p>The superiority of countermeasures like pre-decrement is that it beats a full category of attacks. Timing attacks just don&#8217;t work any more.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: 0x54</title>
		<link>https://javacard.vetilles.com/2015/03/30/about-pin-the-iphone-is-about-20-years-behind-smart-cards/#comment-18920</link>
		<dc:creator><![CDATA[0x54]]></dc:creator>
		<pubDate>Wed, 01 Apr 2015 07:17:04 +0000</pubDate>
		<guid isPermaLink="false">http://javacard.vetilles.com/?p=17472#comment-18920</guid>
		<description><![CDATA[Another way to protect against a power cut off attack for a security device is to have a backup tamper battery like most HSMs. A small capacitor or a tiny rechargeable button battery might have been rather handy although not every security device would be suitable for a tiny tamper power pack fitted onto it&#039;s security chip. In fact, I am personally skeptical about the supposed security of any supposed tamper-resistant chips not backed with a tamper power supply in it&#039;s security encapsulation.]]></description>
		<content:encoded><![CDATA[<p>Another way to protect against a power cut off attack for a security device is to have a backup tamper battery like most HSMs. A small capacitor or a tiny rechargeable button battery might have been rather handy although not every security device would be suitable for a tiny tamper power pack fitted onto it&#8217;s security chip. In fact, I am personally skeptical about the supposed security of any supposed tamper-resistant chips not backed with a tamper power supply in it&#8217;s security encapsulation.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
