首页> 外文期刊>Very Large Scale Integration (VLSI) Systems, IEEE Transactions on >Vulnerability Analysis of Trivium FPGA Implementations
【24h】

Vulnerability Analysis of Trivium FPGA Implementations

机译:Trivium FPGA实现的漏洞分析

获取原文
获取原文并翻译 | 示例

摘要

Today, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT) demand the development of devices that ensure secure communications, preventing malicious agents from tapping sensitive data. Indeed, information security is one of the key challenges to address within the IoT field. Due to the strong resource constraints in some IoT applications, cryptographic algorithms affording lightweight implementations have been proposed. They constitute the so-called lightweight cryptography. A prominent example is the Trivium stream cipher, one of the finalists of the eSTREAM project. Although cryptographic algorithms are certainly simpler, one of their most critical vulnerability sources in terms of hardware implementations is side channel attacks. In this paper, it is studied the vulnerability of field-programmable gate array (FPGA) implementations of Trivium stream ciphers against fault attacks. The design and implementation of a system that alters the clock signal and checks the outcome is also described. A comparison between real and simulated fault injections is carried out in order to examine their veracity. The vulnerability of different versions of the Trivium cipher and their routing dependences has been tested in two different FPGA families. The results show that all versions of the Trivium cipher are vulnerable to fault attacks, although some versions are more vulnerable than others.
机译:如今,各种设备之间交换的大量信息以及物联网(IoT)的增长要求开发确保安全通信,防止恶意代理窃取敏感数据的设备。确实,信息安全是物联网领域要解决的关键挑战之一。由于某些物联网应用中强大的资源约束,已提出了提供轻量级实现的密码算法。它们构成了所谓的轻量级加密。一个著名的例子是Tristium流密码,它是eSTREAM项目的决赛选手之一。尽管加密算法肯定更简单,但就硬件实现而言,其最关键的漏洞来源之一是边信道攻击。本文研究了Trivium流密码的现场可编程门阵列(FPGA)实现针对故障攻击的脆弱性。还描述了改变时钟信号并检查结果的系统的设计和实现。为了检查其真实性,对实际故障注入和模拟故障注入进行了比较。 Trivium密码不同版本的脆弱性及其路由依赖性已在两个不同的FPGA系列中进行了测试。结果表明,Trivium密码的所有版本都容易受到故障攻击,尽管某些版本比其他版本更容易受到攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号