Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs

被引:11
|
作者
Bhasin, Shivam [1 ]
Selmane, Nidhal [1 ]
Guilley, Sylvain [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, CNRS,UMR 5141, LTCI,TCP Project,Dept COMELEC, F-75634 Paris 13, France
关键词
FAULT ANALYSIS;
D O I
10.1109/HST.2009.5225057
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security evaluation of various AES implementation against practical power attacks has been reported in literature. However, to the authors' knowledge, very few of the fault attacks reported on AES have been practically realized. Since sbox is a crucial element in AES, in this article, we evaluate the security of some unprotected AES implementations differing in sbox construction, targeted for FPGA. Here the faults have been generated practically by underpowering the targeted circuit. Then we correlate our results with the underlying architecture, along a methodology already suggested in other articles, albeit theoretically. We also carry out an extensive characterization of the faults, in terms of temporal localization. On the basis of our results, we reach the conclusion that the two cheaper implementations in terms of silicon area are also the more vulnerable against DFA when implemented without countermeasures.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 50 条
  • [31] Security Evaluation of MTJ/CMOS Circuits Against Power Analysis Attacks
    Kumar, S. Dinesh
    Thapliyal, Himanshu
    2017 3RD IEEE INTERNATIONAL SYMPOSIUM ON NANOELECTRONIC AND INFORMATION SYSTEMS (INIS), 2017, : 117 - 122
  • [32] Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES
    Luo, Pei
    Fei, Yunsi
    Zhang, Liwei
    Ding, A. Adam
    2014 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2014,
  • [33] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [34] Improving Security Using Aggregate Signature Scheme Against Different Attacks in WSN
    Nivedha, T.
    Jayanthi, K.
    2018 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2018,
  • [35] Leveraging Larger AES Keys in LoRaWAN: A Practical Evaluation of Energy and Time Costs
    Thaenkaew, Phithak
    Quoitin, Bruno
    Meddahi, Ahmed
    SENSORS, 2023, 23 (22)
  • [36] Practical-time attacks against reduced variants of MISTY1
    Dunkelman, Orr
    Keller, Nathan
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 76 (03) : 601 - 627
  • [37] Practical-time attacks against reduced variants of MISTY1
    Computer Science Department, University of Haifa, Haifa
    31905, Israel
    不详
    52900, Israel
    Des Codes Cryptography, 3 (601-627):
  • [38] Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
    Schulz, Matthias
    Loch, Adrian
    Hollick, Matthias
    21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [39] A Robust and Practical Solution to ADS-B Security Against Denial-of-Service Attacks
    Zhang, Qianyun
    Wang, Zhendong
    Wu, Biyi
    Gui, Guan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 13647 - 13659
  • [40] Practical-time attacks against reduced variants of MISTY1
    Orr Dunkelman
    Nathan Keller
    Designs, Codes and Cryptography, 2015, 76 : 601 - 627