Silicon-level Solutions to Counteract Passive and Active Attacks

作者: Sylvain Guilley , Laurent Sauvage , Jean-Luc Danger , Nidhal Selmane , Renaud Pacalet

DOI: 10.1109/FDTC.2008.18

关键词:

摘要: This article presents a family of cryptographic ASICs, called SecMat, designed in CMOS 130 nanometer technology by the authors with help STMicroelectronics.The purpose these prototype circuits is to experience published ``implementation-level'' attacks(SPA, DPA, EMA, templates, DFA). We report our conclusions about practicability attacks:which ones are most simple mount, and which require more skill, time, equipments, etc.The potential FPGAs as security evaluation commodities at design time also detailed.Then, we discuss ``dual counter-measures'', that meant resist both passive active attacks.This study started four years ago TIMA (Grenoble), framework project MARS. highlight some research directions towards dependable cost-effective dual counter-measures.

参考文章(41)
Thanh-Ha Le, Jessy Clédière, Cécile Canovas, Bruno Robisson, Christine Servière, Jean-Louis Lacoume, A proposition for correlation power analysis enhancement cryptographic hardware and embedded systems. pp. 174- 186 ,(2006) , 10.1007/11894063_14
Chien-Ning Chen, Sung-Ming Yen, Differential fault analysis on AES key schedule and some countermeasures australasian conference on information security and privacy. pp. 118- 129 ,(2003) , 10.1007/3-540-45067-X_11
Serge Chaumette, Damien Sauveron, An Efficient and Simple Way to Test the Security of Java CardsTM international workshop on security. pp. 331- 341 ,(2005)
Olli Vertanen, Java Type Confusion and Fault Attacks Lecture Notes in Computer Science. pp. 237- 251 ,(2006) , 10.1007/11889700_21
Karine Gandolfi, Christophe Mourtel, Francis Olivier, Electromagnetic Analysis: Concrete Results cryptographic hardware and embedded systems. ,vol. 2162, pp. 251- 261 ,(2001) , 10.1007/3-540-44709-1_21
Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi, The EM Side-Channel(s) cryptographic hardware and embedded systems. pp. 29- 45 ,(2002) , 10.1007/3-540-36400-5_4
Danil Sokolov, Julian Murphy, Alex Bystrov, Alex Yakovlev, Improving the Security of Dual-Rail Circuits Lecture Notes in Computer Science. pp. 282- 297 ,(2004) , 10.1007/978-3-540-28632-5_21
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacalet, Differential Power Analysis Model and Some Results smart card research and advanced application conference. pp. 127- 142 ,(2004) , 10.1007/1-4020-8147-2_9
Eric Brier, Christophe Clavier, Francis Olivier, Correlation Power Analysis with a Leakage Model Lecture Notes in Computer Science. pp. 16- 29 ,(2004) , 10.1007/978-3-540-28632-5_2
D. Naccache, Finding faults [data security] ieee symposium on security and privacy. ,vol. 3, pp. 61- 65 ,(2005) , 10.1109/MSP.2005.122