首页> 外文OA文献 >Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation
【2h】

Exploring the feasibility of low cost fault injection attacks on sub-threshold devices through an example of a 65nm AES implementation

机译:通过65nm AES实现示例探索对亚阈值设备进行低成本故障注入攻击的可行性

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The continuous scaling ofVLSItechnology and the aggressive use of lowpower strategies(such assubthreshold voltage) make it possible to implement standard cryptographic primitives within the very limited circuit and power budget of RFID devices.On the other hand, such cryptographic implementations raise concerns regarding their vulnerability to both active and passive side channel attacks.In particular, when focusing on RFID targeted designs,it is important to evaluate their resistance to low cost physical attacks. A common low cost fault injection attack is the one which is induced by insufficient supply voltage of the chip with the goal of causing setup time violations. This kind of fault attack relies on the possibility of gracefully degrading the performance of the chip. It is however, unclear whether this kind of low cost attack is feasible in the case of low voltage design since a reduction of the voltage may result in a catastrophic failure of the device rather than an isolated setup violation.Furthermore,the effect that process variations may have on the fault model used by the attacker and consequently the success probability of the attack, are unknown. In this paper, we investigate these issues by evaluating the resistance to low cost fault injection attacks of chips implementing the AES cipher that were manufactured using a 65nm low power library and operate at subthreshold voltage. We show that it is possible to successfully breach the security of a custom implementation of the AES cipher. Our experiments have taken into account the expected process variations through testing of multiple samples of the chip. To the best of our knowledge,this work is the first attempt to explore the resistance against low cost fault injection attacks on devices that operate at subthreshold voltage and are very susceptible to process variations.
机译:VLSI技术的不断扩展和低功耗策略(例如亚阈值电压)的积极使用使在RFID设备的电路和功率预算非常有限的情况下实现标准的加密原语成为可能,另一方面,这种加密实现也引起了人们对其易受攻击性的担忧。主动和被动侧信道攻击。特别是在关注RFID目标设计时,重要的是评估它们对低成本物理攻击的抵抗力。一种常见的低成本故障注入攻击是由芯片供电电压不足引起的,目的是导致建立时间违规。这种类型的故障攻击依赖于适当降低芯片性能的可能性。但是,目前尚不清楚在低电压设计的情况下这种低成本的攻击是否可行,因为降低电压可能会导致设备的灾难性故障,而不是孤立的设置违规。此外,工艺变化的影响攻击者可能使用的故障模型可能具有未知的结果,因此攻击的成功概率是未知的。在本文中,我们通过评估使用AES密码的芯片的低成本故障注入攻击的抵抗力来研究这些问题,这些芯片使用65nm低功耗库制造并在低于阈值电压下工作。我们表明,有可能成功突破AES密码的自定义实现的安全性。我们的实验已通过测试芯片的多个样本来考虑预期的工艺变化。据我们所知,这项工作是探索对在低于阈值电压且非常容易受到工艺变化影响的设备上进行低成本故障注入攻击的抵抗力的首次尝试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号