Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs

被引:11
|
作者
Bhasin, Shivam [1 ]
Selmane, Nidhal [1 ]
Guilley, Sylvain [1 ]
Danger, Jean-Luc [1 ]
机构
[1] TELECOM ParisTech, Inst TELECOM, CNRS,UMR 5141, LTCI,TCP Project,Dept COMELEC, F-75634 Paris 13, France
关键词
FAULT ANALYSIS;
D O I
10.1109/HST.2009.5225057
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security evaluation of various AES implementation against practical power attacks has been reported in literature. However, to the authors' knowledge, very few of the fault attacks reported on AES have been practically realized. Since sbox is a crucial element in AES, in this article, we evaluate the security of some unprotected AES implementations differing in sbox construction, targeted for FPGA. Here the faults have been generated practically by underpowering the targeted circuit. Then we correlate our results with the underlying architecture, along a methodology already suggested in other articles, albeit theoretically. We also carry out an extensive characterization of the faults, in terms of temporal localization. On the basis of our results, we reach the conclusion that the two cheaper implementations in terms of silicon area are also the more vulnerable against DFA when implemented without countermeasures.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 50 条
  • [41] Security evaluation against electromagnetic analysis at design time
    Li, HY
    Markettos, AT
    Moore, S
    HLDVT'05: TENTH ANNUAL IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2005, : 211 - 218
  • [42] Security evaluation against electromagnetic analysis at design time
    Li, HY
    Markettos, AT
    Moore, S
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 280 - 292
  • [43] No Time to Lose: Israel's Military Attacks against Palestinians in Gaza as Violation of International Humanitarian Law
    Bin Ghait, Mariam
    JOURNAL OF EAST ASIA AND INTERNATIONAL LAW, 2024, 17 (02)
  • [44] Practical Security Bounds against Trojan Horse Attacks in Continuous-Variable Quantum Key Distribution
    Pan, Yaxi
    Zhang, Ling
    Huang, Duan
    APPLIED SCIENCES-BASEL, 2020, 10 (21): : 1 - 16
  • [45] Security of a practical semi-device-independent quantum key distribution protocol against collective attacks
    汪洋
    鲍皖苏
    李宏伟
    周淳
    李源
    Chinese Physics B, 2014, 23 (08) : 260 - 264
  • [46] Survey of Practical Security Frameworks for Defending SIP Based VoIP Systems against DoS/DDoS Attacks
    Armoogum, Sheeba
    Mohamudally, Nawaz
    2014 IST-AFRICA CONFERENCE PROCEEDINGS, 2014,
  • [47] Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks A Practical Security Evaluation on FPGA
    Unterstein, Florian
    Heyszl, Johann
    De Santis, Fabrizio
    Specht, Robert
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 34 - 49
  • [48] Security of a practical semi-device-independent quantum key distribution protocol against collective attacks
    Wang Yang
    Bao Wan-Su
    Li Hong-Wei
    Zhou Chun
    Li Yuan
    CHINESE PHYSICS B, 2014, 23 (08)
  • [49] Security Evaluation of n-Choose-k-Sum PUFs Against Modeling Attacks
    Pang, Lihui
    Kim, Hyoungshick
    Yang, Bin
    Wang, Xinlin
    Gao, Yansong
    IEEE ACCESS, 2021, 9 : 168193 - 168206
  • [50] DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
    Schulz, Matthias
    Loch, Adrian
    Hollick, Matthias
    PROCEEDINGS OF THE 9TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC'16), 2016, : 201 - 203