A Secure Asynchronous FPGA Architecture, Experimental Results and Some Debug Feedback

نویسندگان

  • Sumanta Chaudhuri
  • Sylvain Guilley
  • Philippe Hoogvorst
  • Jean-Luc Danger
  • Taha Beyrouthy
  • Alin Razafindraibe
  • Laurent Fesquet
  • Marc Renaudin
چکیده

This article presents an asynchronous FPGA architecture for implementing cryptographic algorithms secured against physical cryptanalysis. We discuss the suitability of asynchronous reconfigurable architectures for such applications before proceeding to model the side channel and defining our objectives. The logic block architecture is presented in detail. We discuss several solutions for the interconnect architecture, and how these solutions can be ported to other flavours of interconnect (i.e. single driver). Next We discuss in detail a high speed asynchronous configuration chain architecture used to configure our asynchronous FPGA with simulation results, and we present a 3 × 3 prototype FPGA fabricated in 65 nm CMOS. Lastly we present experiments to test the high speed asynchronous configuration chain and evaluate how far our objectives have been achieved with proposed solutions, and we conclude with emphasis on complementary FPGA CAD algorithms, and the effect of CMOS variation on Side-Channel Vulnerability. Key-words: FPGA Structure, Asynchronous Logic, Secure Applications, Side-Channel Attacks, Native Countermeasures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of the Asynchronous Online Discussion Forum on the Iranian EFL Students’ Writing Ability and Attitudes

This paper focuses on the impact of an asynchronous online discussion forum on the development of students’ ability in and attitudes toward writing in English. To do this, 60 undergraduate students majoring in English were assigned to two experimental and control groups while receiving different types of feedback. Students in the experimental group were required to take part in an asynchronous ...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

The Effect of Asynchronous versus Computer-mediated Corrective Feedback on the Correct Use of English Articles in an EFL Context

 The purpose of this study is to investigate the effects of asynchronous computer-mediated versus conventional corrective feedback on learners' writing accuracy. Three groups of learners took part in the study: asynchronous feedback group, conventional feedback group, and a control group. Asynchronous feedback group students received explicit feedback on the targeted structure via e-mail, while...

متن کامل

A Secure Programmable Architecture with a Dedicated Tech-mapping Algorithm: Application to a Crypto-processor

With worldwide communications, information technology and confidentiality have become a major issue for exchanging and securing data. Nevertheless the ASIC high costs and the frequent updates in cryptographic standards used in security applications such as homeland security or banking have made the ciphering algorithms on an embedded FPGA (e-FPGA) co-processor a viable alternative. This paper p...

متن کامل

Architecture of an Asynchronous FPGA for Handshake-Component-Based Design

This paper presents a novel architecture of an asynchronous FPGA for handshake-component-based design. The handshakecomponent-based design is suitable for large-scale, complex asynchronous circuit because of its understandability. This paper proposes an areaefficient architecture of an FPGA that is suitable for handshake-componentbased asynchronous circuit. Moreover, the Four-Phase Dual-Rail en...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1103.1360  شماره 

صفحات  -

تاریخ انتشار 2011