On the hardware design for DES cipher in tamper resistant devices against differential fault analysis

被引:0
作者
Wang, LY
Laih, CS
Tsai, HG
Huang, NM
机构
来源
ISCAS 2000: IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - PROCEEDINGS, VOL II: EMERGING TECHNOLOGIES FOR THE 21ST CENTURY | 2000年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the past 20 years, DES hai; been the most widely used symmetric block cipher for information security. Recently: a novel method called Differential Fault Analysis (DFA) has been proposed to attack DES. Under the assumption that the attacker can induce errors into the cipher device, the key of DES can be unveiled easily. The assumed technique is not mature today, but is like to appear in the near future: especially for attacking a tamper resistant device with an embedded DES VLSI chip. In this paper, we proposed a new hardware design for the DES cipher to resist DFA. By adding some protection circuitry, all the unidirectional faults induced into the registers of a DES chip can be detected. and then alter to the cryptosystem immediately. A hardware emulation experiment using Altera's CPLD chip shows the effectiveness of the protection design.
引用
收藏
页码:697 / 700
页数:4
相关论文
共 12 条
[1]   TRANSACTION SECURITY SYSTEM [J].
ABRAHAM, DG ;
DOLAN, GM ;
DOUBLE, GP ;
STEVENS, JV .
IBM SYSTEMS JOURNAL, 1991, 30 (02) :206-229
[2]  
ANDERSON R, 1997, P 1997 SEC PROT WORK
[3]  
ASHJAEE MJ, 1977, IEEE T COMPUT, V26, P737, DOI 10.1109/TC.1977.1674911
[4]  
Biham E., 1993, DIFFERENTIAL CRYPTAN
[5]  
BIHAM E, ADV CRYPTOLOGY CRYPT, P513
[6]  
BONEH B, 1997, LECT NOTES COMPUTER, P37
[7]  
Fujiwara E., 1989, ERROR CONTROL CODING
[8]  
FUNG WW, 1998, LNCS, V1438, P250
[9]  
LAI X, 1992, ETH SERIES INFORMATI, V1
[10]  
Matsui M., 1993, LECT NOTES COMPUTER, P386