Silicon-level solutions to counteract passive and active attacks

被引:26
作者
Guilley, Sylvain [1 ]
Sauvage, Laurent [1 ]
Danger, Jean-Luc [1 ]
Selmane, Nidhal [1 ]
Pacalet, Renaud [1 ]
机构
[1] TELECOM ParisTech, CNRS, Inst TELECOM, LTCI,UMR 5141,Dept COMELEC, F-75634 Paris 13, France
来源
FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS | 2008年
关键词
side-channel attacks (SCA); differential power analysis (DPA); SecMat ASIC family; dual-rail with precharge logic (DPL); SecLib DPL style; differential fault attack (DFA); FPGA as evaluation platforms; attacks mitigation techniques; dual DPA-DFA counter-measures;
D O I
10.1109/FDTC.2008.18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with the help of STMicroelectronics. The purpose of these prototype circuits is to experience with the published "implementation-level" attacks (SPA, DPA, EMA, templates, DFA). We report our conclusions about the practicability of these attacks: which ones are the most simple to mount, and which ones require more skill, time, equipments, etc. The potential of FPGAs as security evaluation commodities at design time is also detailed. Then, we discuss about "dual counter-measures", that are meant to resist both passive and active attacks. This study started four years ago with TIMA (Grenoble), in the framework of the project MARS [30]. We highlight some research directions towards dependable and cost-effective dual countermeasures.
引用
收藏
页码:3 / 17
页数:15
相关论文
共 50 条
[1]  
AABID MAE, 2007, 2007443 CRYPT
[2]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[3]  
[Anonymous], 2001, FIPS PUB
[4]  
[Anonymous], 2001, P INT C RES SMART CA, DOI DOI 10.1007/3-540-45418-7_17
[5]   The sorcerer's apprentice guide to fault attacks [J].
Bar-El, H ;
Choukri, H ;
Naccache, D ;
Tunstall, M ;
Whelan, C .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :370-382
[6]  
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[7]  
Blömer J, 2003, LECT NOTES COMPUT SC, V2742, P162
[8]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[9]  
Chari S, 2002, LECT NOTES COMPUT SC, V2523, P13
[10]  
CHAUDHURI S, 2007, FPL, P665