Exploiting FPGA Block Memories for Protected Cryptographic Implementations

被引:0
|
作者
Bhasin, Shivam [1 ]
He, Wei [2 ]
Guilley, Sylvain [1 ,3 ]
Danger, Jean-Luc [1 ,3 ]
机构
[1] TELECOM ParisTech, Inst MINES TELECOM, 46 Rue Barrault, F-75634 Paris 13, France
[2] Univ Politecn Madrid, Cent Elect Ind, E-28040 Madrid, Spain
[3] Secure IC SAS, Rennes, France
基金
日本科学技术振兴机构;
关键词
FPGA; Side-Channel Analysis; Block Memories; Countermeasures; POWER ANALYSIS; SECURE; LOGIC; AES;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Modern Field Programmable Gate Arrays (FPGAs) are power packed with features to facilitate designers. Availability of features like huge block memory (BRAM), Digital Signal Processing (DSP) cores, embedded CPU makes the design strategy of FPGAs quite different from ASICs. FPGA are also widely used in security-critical application where protection against known attacks is of prime importance. We focus ourselves on physical attacks which target physical implementations. To design countermeasures against such attacks, the strategy for FPGA designers should also be different from that in ASIC. The available features should be exploited to design compact and strong countermeasures. In this paper, we propose methods to exploit the BRAMs in FPGAs for designing compact countermeasures. BRAM can be used to optimize intrinsic countermeasures like masking and dual-rail logic, which otherwise have significant overhead (at least 2X). The optimizations are applied on a real AES-128 co-processor and tested for area overhead and resistance on Xilinx Virtex-5 chips. The presented masking countermeasure has an overhead of only 16% when applied on AES. Moreover Dual-rail Precharge Logic (DPL) countermeasure has been optimized to pack the whole sequential part in the BRAM, hence enhancing the security. Proper robustness evaluations are conducted to analyze the optimization for area and security.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations
    Corin, Ricardo
    Andres Manzano, Felipe
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 58 - 72
  • [42] On Advances of Lattice-Based Cryptographic Schemes and Their Implementations
    Bandara, Harshana
    Herath, Yasitha
    Weerasundara, Thushara
    Alawatugoda, Janaka
    CRYPTOGRAPHY, 2022, 6 (04)
  • [43] Verifying Cryptographic Software Correctness with Respect to Reference Implementations
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Pinto, Jorge Sousa
    Vieira, Barbara
    FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS, 2009, 5825 : 37 - 52
  • [44] Exploring Formal Methods for Cryptographic Hash Function Implementations
    Mouha, Nicky
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 177 - 195
  • [45] Implementation and Analysis of Cryptographic Ciphers in FPGA
    Kumar, V. G. Kiran
    Rai, C. Shantharama
    EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 653 - 666
  • [46] Implementation of Lightweight Cryptographic Algorithms in FPGA
    Kumar, Kiran V. G.
    Poojary, Asmita
    Rai, Shantharama C.
    Nagesh, H. R.
    2017 2ND INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS, AND COMMUNICATIONS (CCUBE), 2017, : 232 - 235
  • [47] Vulnerability Analysis of Trivium FPGA Implementations
    Potestad-Ordonez, F. E.
    Jimenez-Fernandez, C. J.
    Valencia-Barrero, M.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3380 - 3389
  • [48] Efficient FPGA Implementations of LowMC and Picnic
    Kales, Daniel
    Ramacher, Sebastian
    Rechberger, Christian
    Walch, Roman
    Werner, Mario
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 417 - 441
  • [49] FPGA Implementations of Espresso Stream Cipher
    Kumisbek, Gani
    Anandakumar, N. Nalla
    Hashmi, Mohammad
    2021 28TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS, AND SYSTEMS (IEEE ICECS 2021), 2021,
  • [50] Design verification and debugging FPGA implementations
    Hajimowlana, H
    EDN, 2003, 48 (25) : 69 - +