首页> 外文会议>Conference on Design of Circuits and Integrated Systems >Experimental and timing analysis comparison of FPGA trivium implementations and their vulnerability to clock fault injection
【24h】

Experimental and timing analysis comparison of FPGA trivium implementations and their vulnerability to clock fault injection

机译:FPGA trivium实现的实验和时序分析比较及其对时钟故障注入的脆弱性

获取原文

摘要

The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article presents an experimental fault insertion attack on an FPGA implementation of the Trivium stream cipher. It also compares the faults introduced with the faults expected after a timing analysis. The results show that this implementation is vulnerable to such attacks, and also that it is not possible to estimate the position of the inserted faults by means of timing analysis.
机译:今天,加密电路的安全不仅受到算法攻击的威胁,而且尤其受到电路实现本身的攻击的威胁。这些被称为旁通道攻击。一种是主动故障分析攻击,它可以通过以某种方式改变其行为来使电路容易受到攻击。本文介绍了针对Trivium流密码的FPGA实现的实验性故障插入攻击。它还将引入的故障与经过时序分析后预期的故障进行比较。结果表明,这种实施方式容易受到这种攻击,并且不可能通过时序分析来估计插入故障的位置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号