首页> 外文会议>International Conference on Communication and Electronics Systems >A Counter Measure to Prevent Timing-based Side-Channel Attack on FPGA
【24h】

A Counter Measure to Prevent Timing-based Side-Channel Attack on FPGA

机译:一种防止基于时序的侧通道攻击对FPGA的计数器

获取原文

摘要

FPGA stands for field-programmable gate array. An FPGA is an integrated circuit. A designer can program on FPGA to perform some logical operations. As FPGA is expanding at an exponential rate, threats associated with it are also increasing. A side-channel attack is a serious threat to FPGA. This paper shown how a timing-based side-channel attack can be performed. Further, the proposed research work has observed the run time of the RSA algorithm that can be implemented by using FPGA and shown how timing based side channel attack can be performed. Attackers calculate the run time of the algorithm that is dependent on the secret key and then extract the secret key. Also, the research work has shown how the cryptographic algorithm can be modified to prevent the attackers from performing the timing-based attack. In this paper, the run time of a cryptographic algorithm is calculated for a different set of messages and then by comparing those run times, the secret key is extracted. The algorithm can be modified in such a way that the run time of the algorithm for different set of inputs does not vary and hence the adversaries will be unable to execute the timing based side channel attack. The experimental results have shown that the FPGAs are very much vulnerable to timing-based side-channel attacks and that is why FPGAs should be designed in a way so that attackers cannot perform timing attacks. As the FPGA is gaining popularity security vulnerabilities that arises must be prevented. This motivates us to provide some method to prevent Timing based side channel attack.
机译:FPGA代表现场可编程门阵列。 FPGA是集成电路。设计者可以在FPGA上编程以执行一些逻辑运算。由于FPGA以指数率扩展,与其相关的威胁也在增加。侧频攻击是对FPGA的严重威胁。本文示出了如何执行基于时序的侧通道攻击。此外,所提出的研究工作已经观察到可以通过使用FPGA来实现的RSA算法的运行时间,并示出了如何执行基于定时的侧信道攻击。攻击者计算依赖于密钥的算法的运行时间,然后提取密钥。此外,研究工作表明了如何修改加密算法以防止攻击者执行基于时序的攻击。在本文中,针对不同的消息组计算了加密算法的运行时间,然后通过比较这些运行时间来计算秘密密钥。可以以这样的方式修改算法,即不同集合集的算法的运行时间不会变化,因此对手将无法执行基于时序的侧信道攻击。实验结果表明,FPGA非常容易受到基于时序的侧信道攻击,这就是为什么FPGA应该以一种方式设计,使攻击者无法执行定时攻击。由于FPGA获得了必须防止出现的受欢迎安全漏洞。这使我们提供了一些方法来防止基于时机的侧频攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号