Exploiting FPGA Block Memories for Protected Cryptographic Implementations

被引:0
|
作者
Bhasin, Shivam [1 ]
He, Wei [2 ]
Guilley, Sylvain [1 ,3 ]
Danger, Jean-Luc [1 ,3 ]
机构
[1] TELECOM ParisTech, Inst MINES TELECOM, 46 Rue Barrault, F-75634 Paris 13, France
[2] Univ Politecn Madrid, Cent Elect Ind, E-28040 Madrid, Spain
[3] Secure IC SAS, Rennes, France
基金
日本科学技术振兴机构;
关键词
FPGA; Side-Channel Analysis; Block Memories; Countermeasures; POWER ANALYSIS; SECURE; LOGIC; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Exploiting FPGA Block Memories for Protected Cryptographic Implementations
    Bhasin, Shivam
    Danger, Jean-Luc
    Guilley, Sylvain
    He, Wei
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2015, 8 (03)
  • [2] Protected memristive implementations of cryptographic functions
    Chen, Ziang
    Chen, Li-Wei
    Zhao, Xianyue
    Li, Kefeng
    Schmidt, Heidemarie
    Polian, Ilia
    Du, Nan
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2025, 383 (2288):
  • [3] FPGA implementations of the ICEBERG block cipher
    Standaert, FX
    Piret, G
    Rouvroy, G
    Quisquater, JJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 556 - 561
  • [4] FPGA implementations of the ICEBERG block cipher
    Standaert, F. -X.
    Piret, G.
    Rouvroy, G.
    Quisquater, J. -J.
    INTEGRATION-THE VLSI JOURNAL, 2007, 40 (01) : 20 - 27
  • [5] High-performance FPGA implementations of the cryptographic hash function JH
    Athanasiou, George S.
    Michail, Harris E.
    Theodoridis, George
    Goutis, Costas E.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2013, 7 (01): : 29 - 40
  • [6] Hardware architectures for PRESENT block cipher and their FPGA implementations
    Pandey, Jai Gopal
    Goel, Tarun
    Karmakar, Abhijit
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (07) : 958 - 969
  • [7] Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
    Lai, Li-Chang
    Liu, Jiaxiang
    Shi, Xiaomu
    Tsai, Ming-Hsien
    Wang, Bow-Yaw
    Yang, Bo-Yin
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 377 - 395
  • [8] FPGA implementations of the RC6 block cipher
    Beuchat, JL
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 101 - 110
  • [9] Security and cryptographic hardware implementations
    Sklavos, N
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 768 - 769
  • [10] Maximizing the Throughput of Threshold-protected AES-GCM Implementations on FPGA
    Vliegen, Jo
    Reparaz, Oscar
    Mentens, Nele
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 140 - 145