Title :
Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks
Author :
Selmane, N. ; Bhasin, Shubhendu ; Guilley, Sylvain ; Danger, Jean-Luc
Author_Institution :
Inst. TELECOM, TELECOM ParisTech, Paris, France
fDate :
12/1/2011 12:00:00 AM
Abstract :
Fault attacks are real threats against hardware implementations of robust cryptographic algorithms such as advanced encryption standard (AES). The authors present an active non-invasive attack to inject faults during the execution of the algorithm and describe setup time violation attacks by under-powering and overclocking an application-specific integrated circuit. Then a security evaluation is presented against setup time violation attacks of several AES architectures on two field programmable gate arrays (FPGA) brands, namely Altera Stratix and Xilinx Virtex5. The authors notice that the architecture of the substitution box greatly impacts the faults statistics. These statistics are furthermore different depending on the FPGA vendor, and also notice that it is more difficult to inject single fault in the most recent technology. Also, the use-cases show how difficult it is to predict the most vulnerable resource in an FPGA. Finally, a low-cost countermeasure against this kind of attack is presented.
Keywords :
application specific integrated circuits; cryptography; fault diagnosis; field programmable gate arrays; AES architectures; Altera Stratix; FPGA brands; FPGA vendor; Xilinx Virtex5; active noninvasive attack; advanced encryption standard; application-specific integrated circuits; fault attacks; faults statistics; field programmable gate arrays; hardware implementations; inject faults; low-cost countermeasure; robust cryptographic algorithms; security evaluation; setup time violation attacks; substitution box; vulnerable resource;
Journal_Title :
Information Security, IET
DOI :
10.1049/iet-ifs.2010.0238