Security and Reliability Evaluation of Countermeasures implemented using High-Level Synthesis

被引:1
作者
Koufopoulou, Amalia-Artemis [1 ]
Xevgeni, Kalliopi [1 ]
Papadimitriou, Athanasios [1 ,2 ]
Psarakis, Mihalis [1 ]
Hely, David [3 ]
机构
[1] Univ Piraeus, Dept Informat, Piraeus, Greece
[2] Univ Peloponnese, Dept Digital Syst, Tripoli, Greece
[3] Univ Grenoble Alpes, CEA, Leti, F-38000 Grenoble, France
来源
2022 IEEE 28TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2022) | 2022年
关键词
High-Level Synthesis (HLS); SBOX; FPGA; Side Channel Analysis; Reliability; Countermeasures;
D O I
10.1109/IOLTS56730.2022.9897824
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As the complexity of digital circuits increases, High-Level Synthesis (HLS) is becoming a valuable tool to increase productivity and design reuse by utilizing relevant Electronic Design Automation (EDA) flows, either for Application-Specific Integrated Circuits (ASIC) or for Field Programmable Gate Arrays (FPGA). Side Channel Analysis (SCA) and Fault Injection (FI) attacks are powerful hardware attacks, capable of greatly weakening the theoretical security levels of secure implementations. Furthermore, critical applications demand high levels of reliability including fault tolerance. The lack of security and reliability driven optimizations in HLS tools makes it necessary for the HLS-based designs to validate that the properties of the algorithm and the countermeasures have not been compromised due to the HLS flow. In this work, we provide results on the resilience evaluation of HLS-based FPGA implementations for the aforementioned threats. As a test case, we use multiple versions of an on-the-fly SBOX algorithm integrating different countermeasures (hiding and masking), written in C and implemented using Vivado HLS We perform extensive evaluations for all the designs and their optimization scenarios. The results provide evidence of issues arising from HLS optimizations on the security and reliability of cryptographic implementations. Furthermore, the results put HLS algorithms to the test of designing secure accelerators and can lead to improving them towards the goal of increasing productivity in the domain of secure and reliable cryptographic implementations.
引用
收藏
页数:8
相关论文
共 44 条
[31]  
Sadhukhan Rajat, 2021, 2021 58 ACM IEEE DES
[32]   Leakage Assessment Methodology A Clear Roadmap for Side-Channel Evaluations [J].
Schneider, Tobias ;
Moradi, Amir .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 :495-513
[33]  
Shastri A, 2015, IEEE INT CONF ASAP, P202, DOI 10.1109/ASAP.2015.7245735
[34]   Practical fault resilient hardware implementations of AES [J].
Sheikhpour, Saeide ;
Mahani, Ali ;
Bagheri, Nasour .
IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (05) :596-606
[35]   HLS-based Performance and Resource Optimization of Cryptographic Modules [J].
Silitonga, Arthur ;
Schade, Florian ;
Jiang, Guanru ;
Becker, Juergen .
2018 IEEE INT CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, UBIQUITOUS COMPUTING & COMMUNICATIONS, BIG DATA & CLOUD COMPUTING, SOCIAL COMPUTING & NETWORKING, SUSTAINABLE COMPUTING & COMMUNICATIONS, 2018, :1009-1016
[36]   High-level synthesis, cryptography, and side-channel countermeasures: A comprehensive evaluation [J].
Socha, Petr ;
Miskovsky, Vojtech ;
Novotny, Martin .
MICROPROCESSORS AND MICROSYSTEMS, 2021, 85 (85)
[37]  
Taher FN, 2018, IEEE INT ON LINE, P232, DOI 10.1109/IOLTS.2018.8474222
[38]  
Takach Andres, 2016, 2016 21 ASIA S PACIF
[39]  
Thillard A, 2013, LECT NOTES COMPUT SC, V8086, P21, DOI 10.1007/978-3-642-40349-1_2
[40]   Side-channel attack pitfalls [J].
Tiri, Kris .
2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, :15-20