Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA

被引:48
作者
Canivet, G. [1 ,2 ]
Maistri, P. [1 ]
Leveugle, R. [1 ]
Clediere, J. [2 ]
Valette, F. [3 ]
Renaudin, M. [4 ]
机构
[1] UJF, TIMA Lab, Grenoble INP, CNRS, F-38031 Grenoble, France
[2] Minatec, CESTI CEA LETI, F-38054 Grenoble 9, France
[3] DGA CELAR, F-35171 Bruz, France
[4] Tiempo, F-38330 Montbonnot St Martin, France
关键词
AES; SRAM-based FPGA; Power glitch; Laser fault injections; DDR; CONFIGURATION; ERRORS;
D O I
10.1007/s00145-010-9083-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Programmable devices are an interesting alternative when implementing embedded systems on a low-volume scale. In particular, the affordability and the versatility of SRAM-based FPGAs make them attractive with respect to ASIC implementations. FPGAs have thus been used extensively and successfully in many fields, such as implementing cryptographic accelerators. Hardware implementations, however, must be protected against malicious attacks, e.g. those based on fault injections. Protections have been usually evaluated on ASICs, but FPGAs can be vulnerable as well. This work presents thus fault injection attacks against a secured AES architecture implemented on a SRAM-based FPGA. The errors are injected during the computation by means of voltage glitches and laser attacks. To our knowledge, this is one of the first works dealing with dynamic laser fault injections. We show that fault attacks on SRAM-based FPGAs may behave differently with respect to attacks against ASIC, and they need therefore to be addressed by specific countermeasures, that are also discussed in this paper. In addition, we discuss the different effects obtained by the two types of attacks.
引用
收藏
页码:247 / 268
页数:22
相关论文
共 24 条
[1]  
Agrawal D, 2002, LECT NOTES COMPUT SC, V2523, P29
[2]  
[Anonymous], IEEE T NUCL SCI
[3]  
[Anonymous], 2001, FIPS-197
[4]  
[Anonymous], 2001, CRYPTOGRAPHIC HARDWA
[5]   The sorcerer's apprentice guide to fault attacks [J].
Bar-El, H ;
Choukri, H ;
Naccache, D ;
Tunstall, M ;
Whelan, C .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :370-382
[6]   Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs [J].
Bhasin, Shivam ;
Selmane, Nidhal ;
Guilley, Sylvain ;
Danger, Jean-Luc .
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, :15-21
[7]   On the importance of eliminating errors in cryptographic computations [J].
Boneh, D ;
DeMillo, RA ;
Lipton, RJ .
JOURNAL OF CRYPTOLOGY, 2001, 14 (02) :101-119
[8]  
Canivet G, 2008, IEEE INT ON LINE, P289, DOI [10.1109/IOLTS.2008.41, 10.1109/IOLTS.2009.41]
[9]   Characterization of Effective Laser Spots during Attacks in the Configuration of a Virtex-II FPGA [J].
Canivet, G. ;
Leveugle, R. ;
Clediere, J. ;
Valette, F. ;
Renaudin, M. .
2009 27TH IEEE VLSI TEST SYMPOSIUM, PROCEEDINGS, 2009, :327-+
[10]  
CARLUCCIO D, 2005, WORKSH RFID LIGHTW C