Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs

被引:11
|
作者
Bhasin, Shivam [1 ]
Selmane, Nidhal [1 ]
Guilley, Sylvain [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, CNRS,UMR 5141, LTCI,TCP Project,Dept COMELEC, F-75634 Paris 13, France
关键词
FAULT ANALYSIS;
D O I
10.1109/HST.2009.5225057
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security evaluation of various AES implementation against practical power attacks has been reported in literature. However, to the authors' knowledge, very few of the fault attacks reported on AES have been practically realized. Since sbox is a crucial element in AES, in this article, we evaluate the security of some unprotected AES implementations differing in sbox construction, targeted for FPGA. Here the faults have been generated practically by underpowering the targeted circuit. Then we correlate our results with the underlying architecture, along a methodology already suggested in other articles, albeit theoretically. We also carry out an extensive characterization of the faults, in terms of temporal localization. On the basis of our results, we reach the conclusion that the two cheaper implementations in terms of silicon area are also the more vulnerable against DFA when implemented without countermeasures.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 50 条
  • [21] Practical security and privacy attacks against biometric hashing using sparse recovery
    Berkay Topcu
    Cagatay Karabat
    Matin Azadmanesh
    Hakan Erdogan
    EURASIP Journal on Advances in Signal Processing, 2016
  • [22] Practical security and privacy attacks against biometric hashing using sparse recovery
    Topcu, Berkay
    Karabat, Cagatay
    Azadmanesh, Matin
    Erdogan, Hakan
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2016, : 1 - 20
  • [23] Practical evaluation of security against generalized interpolation attack
    Aoki, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (01): : 33 - 38
  • [24] Security evaluation of dual rail logic against DPA attacks
    Razafindraibe, A.
    Maurine, P.
    Robert, M.
    Renaudin, M.
    IFIP VLSI-SOC 2006: IFIP WG 10.5 INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION & SYSTEM-ON-CHIP, 2006, : 181 - +
  • [25] Security evaluation of WDDL and SecLib countermeasures against power attacks
    Guilley, Sylvain
    Sauvage, Laurent
    Hoogvorst, Philippe
    Pacalet, Renaud
    Bertoni, Guido Marco
    Chaudhuri, Sumanta
    IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (11) : 1482 - 1497
  • [26] Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison
    Benhadjyoussef, Noura
    Karmani, Mouna
    Machhout, Mohsen
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (04): : 264 - 271
  • [27] Analysis of S-Box Hardware Resources to Improve AES Intrinsic Security Against Power Attacks
    Singha, Thockchom Birjit
    Palathinkal, Roy Paily
    Ahamed, Shaik Rafi
    IEEE Embedded Systems Letters, 2024, 16 (04) : 525 - 528
  • [28] A Practical Approach to Protect IoT Devices against Attacks and Compile Security Incident Datasets
    Cruz, Bruno
    Gomez-Meire, Silvana
    Ruano-Ordas, David
    Janicke, Helge
    Yevseyeva, Iryna
    Mendez, Jose R.
    SCIENTIFIC PROGRAMMING, 2019, 2019
  • [29] On the Security of Practical Mail User Agents against Cache Side-Channel Attacks
    Kim, Hodong
    Yoon, Hyundo
    Shin, Youngjoo
    Hur, Junbeom
    APPLIED SCIENCES-BASEL, 2020, 10 (11):
  • [30] Three Practical Attacks Against ZigBee Security: Attack Scenario Definitions, Practical Experiments, Countermeasures, and Lessons Learned
    Olawumi, Olayemi
    Haataja, Keijo
    Asikainen, Mikko
    Vidgren, Niko
    Toivanen, Pekka
    2014 14TH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS (HIS), 2014, : 199 - 206