Exploiting FPGA Block Memories for Protected Cryptographic Implementations

被引:0
|
作者
Bhasin, Shivam [1 ]
He, Wei [2 ]
Guilley, Sylvain [1 ,3 ]
Danger, Jean-Luc [1 ,3 ]
机构
[1] TELECOM ParisTech, Inst MINES TELECOM, 46 Rue Barrault, F-75634 Paris 13, France
[2] Univ Politecn Madrid, Cent Elect Ind, E-28040 Madrid, Spain
[3] Secure IC SAS, Rennes, France
基金
日本科学技术振兴机构;
关键词
FPGA; Side-Channel Analysis; Block Memories; Countermeasures; POWER ANALYSIS; SECURE; LOGIC; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Lightweight and Secure Cryptographic Implementations for the Internet of Things
    Preneel, Bart
    INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : XIII - XIV
  • [32] IDEA cryptographic processor in FPGA
    Patel, Parimal
    Parikh, Chirag
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2005, 5 (01) : S201 - S208
  • [33] Design verification of FPGA implementations
    Chen, XT
    Huang, WK
    Park, N
    Meyer, FJ
    Lombardi, F
    IEEE DESIGN & TEST OF COMPUTERS, 1999, 16 (02): : 66 - 73
  • [34] Design verification of FPGA implementations
    Fudan University, Shanghai, China
    不详
    不详
    不详
    IEEE Des Test Comput, 2 (66-73):
  • [35] FPGA Implementations of BCD Multipliers
    Sutter, G.
    Todorovich, E.
    Bioul, G.
    Vazquez, M.
    Deschamps, J-P.
    2009 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS, 2009, : 36 - +
  • [36] Automated Verification of Real-World Cryptographic Implementations
    Tomb, Aaron
    IEEE SECURITY & PRIVACY, 2016, 14 (06) : 26 - 33
  • [37] Evaluation of (power) side-channels in cryptographic implementations
    Bache, Florian
    Plump, Christina
    Wloka, Jonas
    Gueneysu, Tim
    Drechsler, Rolf
    IT-INFORMATION TECHNOLOGY, 2019, 61 (01): : 15 - 28
  • [38] Chai-Tea, Cryptographic Hardware Implementations of xTEA
    Kaps, Jens-Peter
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 363 - 375
  • [39] Comparison of Hardware Implementations of Cryptographic Algorithms for IoT Applications
    Goswami, Sushree Sila P.
    Trivedi, Gaurav
    2023 33RD INTERNATIONAL CONFERENCE RADIOELEKTRONIKA, RADIOELEKTRONIKA, 2023,
  • [40] Identifying and testing for insecure paths in cryptographic protocol implementations
    Jayaram, K. R.
    30th Annual International Computer Software and Applications Conference, Vol 2, Short Papers/Workshops/Fast Abstracts/Doctoral Symposium, Proceedings, 2006, : 368 - 369