Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks

被引:23
作者
Selmane, N. [1 ,2 ]
Bhasin, S. [1 ,2 ]
Guilley, S. [1 ,2 ]
Danger, J. -L. [1 ,2 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, CNRS LTCI UMR 5141, Paris, France
[2] Dept COMELEC, F-75634 Paris 13, France
关键词
AES;
D O I
10.1049/iet-ifs.2010.0238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fault attacks are real threats against hardware implementations of robust cryptographic algorithms such as advanced encryption standard (AES). The authors present an active non-invasive attack to inject faults during the execution of the algorithm and describe setup time violation attacks by under-powering and overclocking an application-specific integrated circuit. Then a security evaluation is presented against setup time violation attacks of several AES architectures on two field programmable gate arrays (FPGA) brands, namely Altera Stratix and Xilinx Virtex5. The authors notice that the architecture of the substitution box greatly impacts the faults statistics. These statistics are furthermore different depending on the FPGA vendor, and also notice that it is more difficult to inject single fault in the most recent technology. Also, the use-cases show how difficult it is to predict the most vulnerable resource in an FPGA. Finally, a low-cost countermeasure against this kind of attack is presented.
引用
收藏
页码:181 / 190
页数:10
相关论文
共 21 条
[1]  
Agoyan M, 2010, LECT NOTES COMPUT SC, V6035, P182, DOI 10.1007/978-3-642-12510-2_13
[2]  
[Anonymous], 2008, 2008 NEW TECHNOLOGIE
[3]   The sorcerer's apprentice guide to fault attacks [J].
Bar-El, H ;
Choukri, H ;
Naccache, D ;
Tunstall, M ;
Whelan, C .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :370-382
[4]  
Barenghi A., 2009, LOW VOLTAGE FAULT AT, P23
[5]  
Barenghi A., 2010, LOW VOLTAGE FAULT AT, P13
[6]   Error analysis and detection procedures for a hardware implementation of the Advanced Encryption Standard [J].
Bertoni, G ;
Breveglieri, L ;
Koren, I ;
Maistri, P ;
Piuri, V .
IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (04) :492-505
[7]  
Biham E., 1997, LNCS, V1294, P1513
[8]  
Boas ALW, 2004, SBCCI2004:17TH SYMPOSIUM ON INTEGRATED CIRCUITS AND SYSTEMS DESIGN, PROCEEDINGS, P44
[9]   On the importance of eliminating errors in cryptographic computations [J].
Boneh, D ;
DeMillo, RA ;
Lipton, RJ .
JOURNAL OF CRYPTOLOGY, 2001, 14 (02) :101-119
[10]  
Chen CN, 2003, LECT NOTES COMPUT SC, V2727, P118