首页> 外文会议>Cryptographic Hardware and Embedded Systems-CHES 2008 >Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration
【24h】

Power and Fault Analysis Resistance in Hardware through Dynamic Reconfiguration

机译:通过动态重新配置硬件的电源和故障分析电阻

获取原文
获取原文并翻译 | 示例

摘要

Dynamically reconfigurable systems are known to have many advantages such as area and power reduction. The drawbacks of these systems are the reconfiguration delay and the overhead needed to provide reconfigurability. We show that dynamic reconfiguration can also improve the resistance of cryptographic systems against physical attacks. First, we demonstrate how dynamic reconfiguration can realize a range of coun-termeasures which are standard for software implementations and that were practically not portable to hardware so far. Second, we introduce a new class of countermeasure that, to the best of our knowledge, has not been considered so far. This type of countermeasure provides increased resistance, in particular against fault attacks, by randomly changing the physical location of functional blocks on the chip area at run-time. Third, we show how fault detection can be provided on certain devices with negligible area-overhead. The partial bitstreams can be read back from the reconfigurable areas and compared to a reference version at run-time and inside the device. For each countermeasure, we propose a prototype architecture and evaluate the cost and security level it provides. All proposed countermeasures do not change the device's input-output behavior, thus they are transparent to upper-level protocols. Moreover, they can be implemented jointly and complemented by other countermeasures on algorithm-, circuit-, and gate-level.
机译:已知动态可重配置系统具有许多优势,例如面积和功耗降低。这些系统的缺点是重新配置延迟和提供可重新配置性所需的开销。我们证明了动态重新配置还可以提高密码系统对物理攻击的抵抗力。首先,我们演示了动态重配置如何实现一系列对策,这些对策是软件实现的标准,而到目前为止,这些措施实际上还不能移植到硬件上。第二,据我们所知,我们引入了迄今为止尚未考虑的一类新的对策。通过在运行时随机更改功能块在芯片区域上的物理位置,此类对策可提供更大的抵抗力,尤其是对故障攻击的抵抗力。第三,我们展示了如何在面积开销可忽略的某些设备上提供故障检测。可以从可重配置区域读取部分位流,并在运行时和设备内部将其与参考版本进行比较。对于每种对策,我们提出一个原型架构,并评估其提供的成本和安全级别。所有建议的对策都不会改变设备的输入输出行为,因此对上层协议是透明的。此外,它们可以联合实施,并在算法,电路和门级上采用其他对策进行补充。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号