Exploiting FPGA Block Memories for Protected Cryptographic Implementations

被引:0
|
作者
Bhasin, Shivam [1 ]
He, Wei [2 ]
Guilley, Sylvain [1 ,3 ]
Danger, Jean-Luc [1 ,3 ]
机构
[1] TELECOM ParisTech, Inst MINES TELECOM, 46 Rue Barrault, F-75634 Paris 13, France
[2] Univ Politecn Madrid, Cent Elect Ind, E-28040 Madrid, Spain
[3] Secure IC SAS, Rennes, France
基金
日本科学技术振兴机构;
关键词
FPGA; Side-Channel Analysis; Block Memories; Countermeasures; POWER ANALYSIS; SECURE; LOGIC; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Different Implementations of AES Cryptographic Algorithm
    Guo, Guang-liang
    Qian, Quan
    Zhang, Rui
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1848 - 1853
  • [22] Cryptographic applications in FPGA
    Deschamps, J. -P.
    LATIN AMERICAN APPLIED RESEARCH, 2007, 37 (01) : 3 - 10
  • [23] Probabilistic Relational Verification for Cryptographic Implementations
    Barthe, Gilles
    Fournet, Cedric
    Gregoire, Benjamin
    Strub, Pierre-Yves
    Swamy, Nikhil
    Zanella-Beguelin, Santiago
    ACM SIGPLAN NOTICES, 2014, 49 (01) : 193 - 205
  • [24] Efficient implementations of Bloom filter using block RAMs and DSP slices on the FPGA
    Wada, Takuma
    Matsumura, Naoki
    Yasudo, Ryota
    Nakano, Koji
    Ito, Yasuaki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (12):
  • [25] Fault Diagnosis Schemes for Secure Lightweight Cryptographic Block Cipher RECTANGLE Benchmarked on FPGA
    Aghaie, Anita
    Kermani, Mehran Mozaffari
    Azarderakhsh, Reza
    23RD IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS CIRCUITS AND SYSTEMS (ICECS 2016), 2016, : 768 - 771
  • [26] Safe and Secure? On the Timing Analysability of Cryptographic Implementations
    Stegmeier, Alexander
    Knauer, Peter
    Schubaur, Philipp
    Piatka, Christian
    Merli, Dominik
    Altmeyer, Sebastian
    2024 IEEE 30TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM, RTAS 2024, 2023, : 68 - 80
  • [27] Architectures and FPGA implementations of the 64-bit MISTY1 block cipher
    Kitsos, P.
    Galanis, M. D.
    Koufopavlou, O.
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2006, 15 (06) : 817 - 831
  • [28] Vivienne: Relational Verification of Cryptographic Implementations in WebAssembly
    Tsoupidi, Rodothea Myrsini
    Balliu, Musard
    Baudry, Benoit
    2021 IEEE SECURE DEVELOPMENT CONFERENCE (SECDEV 2021), 2021, : 94 - 102
  • [29] VEHICULAR IMPLEMENTATIONS OF PUBLIC KEY CRYPTOGRAPHIC TECHNIQUES
    ARAZI, B
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 1991, 40 (03) : 646 - 653
  • [30] Finding Bugs in Cryptographic Hash Function Implementations
    Mouha, Nicky
    Raunak, Mohammad S.
    Kuhn, D. Richard
    Kacker, Raghu
    IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (03) : 870 - 884