Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs

被引:11
|
作者
Bhasin, Shivam [1 ]
Selmane, Nidhal [1 ]
Guilley, Sylvain [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, CNRS,UMR 5141, LTCI,TCP Project,Dept COMELEC, F-75634 Paris 13, France
关键词
FAULT ANALYSIS;
D O I
10.1109/HST.2009.5225057
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security evaluation of various AES implementation against practical power attacks has been reported in literature. However, to the authors' knowledge, very few of the fault attacks reported on AES have been practically realized. Since sbox is a crucial element in AES, in this article, we evaluate the security of some unprotected AES implementations differing in sbox construction, targeted for FPGA. Here the faults have been generated practically by underpowering the targeted circuit. Then we correlate our results with the underlying architecture, along a methodology already suggested in other articles, albeit theoretically. We also carry out an extensive characterization of the faults, in terms of temporal localization. On the basis of our results, we reach the conclusion that the two cheaper implementations in terms of silicon area are also the more vulnerable against DFA when implemented without countermeasures.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 50 条
  • [1] Practical setup time violation attacks on AES
    Selmane, Nidhal
    Guilley, Sylvain
    Danger, Jean-Luc
    EDCC-7: SEVENTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE, PROCEEDINGS, 2008, : 91 - 96
  • [2] WDDL is Protected Against Setup Time Violation Attacks
    Selmane, Nidhal
    Bhasin, Shivam
    Guilley, Sylvain
    Graba, Tarik
    Danger, Jean-Luc
    2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 73 - 83
  • [3] WDDL is Protected Against Setup Time Violation Attacks
    Selmane, Nidhal
    Bhasin, Shivam
    Guilley, Sylvain
    Graba, Tarik
    Danger, Jean-Luc
    PROCEEDINGS OF THE 2009 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2009), 2009, : 73 - 83
  • [4] Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks
    Selmane, N.
    Bhasin, S.
    Guilley, S.
    Danger, J. -L.
    IET INFORMATION SECURITY, 2011, 5 (04) : 181 - 190
  • [5] The research of DPA attacks against AES implementations
    Department of Electronic Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China
    J. China Univ. Post Telecom., 2008, 4 (101-106):
  • [7] A Security Comparison between AES-128 and AES-256 FPGA implementations against DPA attacks
    Zuniga Gonzalez, Virginia
    Tena-Sanchez, Erica
    Acosta, Antonio J.
    2023 38TH CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS, DCIS, 2023,
  • [8] Strengthening hardware AES implementations against fault attacks
    Joye, M.
    Manet, P.
    Rigaud, J. -B.
    IET INFORMATION SECURITY, 2007, 1 (03) : 106 - 110
  • [9] Two practical attacks against Bluetooth security using new enhanced implementations of security analysis tools
    Haataja, Keijo M. J.
    Proceedings of the IASTED International Conference on Communication, Network, and Information Security, 2005, : 13 - 18
  • [10] Updates on the security of FPGAs against power analysis attacks
    Standaert, F. -X.
    Mace, F.
    Peeters, E.
    Quisquater, J. -J.
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 2006, 3985 : 335 - 346