首页> 外文会议>Conference on Design of Circuits and Integrated Systems >Experimental and timing analysis comparison of FPGA trivium implementations and their vulnerability to clock fault injection
【24h】

Experimental and timing analysis comparison of FPGA trivium implementations and their vulnerability to clock fault injection

机译:FPGA Trivium实现的实验和时序分析比较及其对时钟故障注射的脆弱性

获取原文

摘要

The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article presents an experimental fault insertion attack on an FPGA implementation of the Trivium stream cipher. It also compares the faults introduced with the faults expected after a timing analysis. The results show that this implementation is vulnerable to such attacks, and also that it is not possible to estimate the position of the inserted faults by means of timing analysis.
机译:Cryptocircuits的安全性今天不仅受到算法的攻击,而且还通过对电路实现本身的攻击来威胁。这些被称为侧通道攻击。一种繁多是主动故障分析攻击,可以通过以某种方式改变其行为来使电路变得易受攻击。本文介绍了对扭转流密码的FPGA实现的实验故障插入攻击。它还比较了定时分析后预期的故障引入的故障。结果表明,该实现容易受到这种攻击的影响,并且还可以通过定时分析来估计插入的故障的位置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号