An on-chip glitchy-clock generator for testing fault injection attacks

被引:53
作者
Endo, Sho [1 ]
Sugawara, Takeshi [1 ]
Homma, Naofumi [1 ]
Aoki, Takafumi [1 ]
Satoh, Akashi [2 ]
机构
[1] Tohoku Univ, Aoba Ku, 6-6-05,Aramaki Aza Aoba, Sendai, Miyagi 9808579, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki 3058568, Japan
关键词
Fault injection attacks; Clock glitch; RSA; Safe-error attack;
D O I
10.1007/s13389-011-0022-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a glitchy-clock generator integrated inFPGAfor evaluating fault injection attacks and their countermeasures on cryptographic modules. The proposed generator exploits clock management capabilities, which are common in modern FPGAs, to generate clock signal with temporal voltage spike. The shape and timing of the glitchy- clock cycle are configurable at run time. The proposed generator can be embedded in a single FPGA without any external instrument (e.g., a pulse generator and a variable power supply). Such integration enables reliable and reproducible fault injection experiments. In this paper, we examine the characteristics of the proposed generator through experiments on Side-channel Attack Standard Evaluation Board (SASEBO). The result shows that the timing of the glitches can be controlled at the step of about 0.17 ns. We also demonstrate its application to the safe-error attack against an RSA processor.
引用
收藏
页码:265 / 270
页数:6
相关论文
共 15 条
[1]   Passive and active combined attacks [J].
Amiel, Frederic ;
Villegas, Karine ;
Feix, Benoit ;
Marcel, Louis .
WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2007, :92-+
[2]  
Bar-El H., 2004, IACR CRYPTOLOGY EPRI, P100
[3]  
Biham E, 1997, LECT NOTES COMPUT SC, V1294, P513
[4]  
Boneh D., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P37
[5]  
Clavier C, 2007, LECT NOTES COMPUT SC, V4727, P181
[6]  
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[7]  
Endo S., 2011, 2 INT WORKSH CONSTR, P175
[8]  
Fukunaga T, 2009, 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), P84, DOI 10.1109/FDTC.2009.34
[9]   Silicon-level solutions to counteract passive and active attacks [J].
Guilley, Sylvain ;
Sauvage, Laurent ;
Danger, Jean-Luc ;
Selmane, Nidhal ;
Pacalet, Renaud .
FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, :3-17
[10]   Comparative Power Analysis of Modular Exponentiation Algorithms [J].
Homma, Naofumi ;
Miyamoto, Atsushi ;
Aoki, Takafumi ;
Satoh, Akashi ;
Shamir, Adi .
IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) :795-807