On the Synthesis of Attack Tolerant Cryptographic Hardware

被引:0
作者
Mathew, J. [1 ]
Banerjee, S. [1 ]
Rahaman, H. [2 ]
Pradhan, D. K. [1 ]
Mohanty, S. P. [3 ]
Jabir, A. M. [4 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1TH, Avon, England
[2] Bengal Engn & Sci Univ, Sibpur, W Bengal, India
[3] Univ North Texas, Denton, TX 76203 USA
[4] Oxford Brookes Univ, Dept Comp Sci & Elect, Oxford OX3 0BP, England
来源
PROCEEDINGS OF THE 2010 18TH IEEE/IFIP INTERNATIONAL CONFERENCE ON VLSI AND SYSTEM-ON-CHIP | 2010年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Concurrent error detection and correction is an effective way to mitigate fault attacks in cryptographic hardware. Recent work on differential power analysis shows that even mathematically-secure cryptographic protocols may be vulnerable at the physical implementation level. By measuring energy consumed by a working digital circuit, it is possible to gain valuable information about the encryption algorithms used and even the specific encryption keys. Thwarting such attacks requires a new approach to logic and physical designs. This paper presents a systematic approach to fault tolerant cryptographic hardware designs. Firstly, the effectiveness of the Hamming code based error correction schemes as a fault tolerance method in stream ciphers is investigated. Coding is applied to Linear Feedback Shift Registers (LFSR) based stream cipher implementations. The method was implemented on industrial standard stream ciphers, e. g. A5/1(GSM), E0 (Bluetooth), RC4 (WEP), and W7. The performance variation of stream cipher algorithms with error detection and correction was studied by synthesising the designs on Field Programmable Logic Arrays (FPGA) and Application Specific Integrated Circuits (ASIC). Further, we analyse hardware building blocks to minimise switching activity of a circuit over all possible inputs and input transitions by adding redundant gates and increasing the overall number of signal transitions. We also discuss the overhead and compositional properties of uniformly-switching circuits.
引用
收藏
页码:286 / 291
页数:6
相关论文
共 24 条
  • [1] [Anonymous], REC GSM 02 09
  • [2] [Anonymous], 2001, Specification of the Bluetooth System
  • [3] [Anonymous], 1996, CRYPTO, DOI DOI 10.1007/3-540-68697-5_9
  • [4] Benini L, 2003, DES AUT CON, P36
  • [5] Glitch power minimization by gate freezing
    Benini, L
    De Micheli, G
    Macii, A
    Macii, E
    Poncino, M
    Scarsi, R
    [J]. DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION 1999, PROCEEDINGS, 1999, : 163 - 167
  • [6] Boneh D., 2001, J CRYPTOL
  • [7] Boneh D., 2003, 12 US SEC S
  • [8] A BIST pattern generator design for near-perfect fault coverage
    Chatterjee, M
    Pradhan, DK
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (12) : 1543 - 1558
  • [9] Ciet M., 2006, DESIGNS CODES CRYPTO
  • [10] Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292