Differential Power Analysis: A Serious Threat to FPGA Security
نویسنده
چکیده مقاله:
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and rapid prototyping, it is imperative to consider security on FPGAs as a whole. During last years, there has been a large amount of work done dealing with the algorithmic and architectural aspects of cryptographic schemes implemented on FPGAs, however, there are only a few articles that assess their vulnerability to such attacks which, in practice, pose far a greater danger than algorithmic attacks. This paper first demonstrates the vulnerability of the Advanced Encryption Standard Algorithm (AES) implemented on a FPGA and then presents a novel approach for implementation of the AES algorithm which provides a significantly improved strength against differential power analysis with a minimal additional hardware overhead. The efficiency of the proposed technique was verified by practical results obtained from real implementation on a Xilinx Spartan-II FPGA.
منابع مشابه
Differential Power Analysis Attack on FPGA Implementation of AES
Cryptographic devices have found their way into a wide range of application and the topic of their security has reached great research importance. It has been proved that encryption device leaks information, which can be exploited by various attacks such as power analysis, timing analysis and electro-magnetic radiation. Differential power analysis is a powerful and efficient cryptanalytic techn...
متن کاملSerious new threat to Brazilian forests.
Brazil’s Forest Code was enacted in 1965 and protects forests in certain locations, such as along rivers and on steep slopes and hilltops. It is the only legislation in the world that requires private rural landowners to retain reserves of natural vegetation. In the Atlantic Rainforest, the Forest Code states that 20% of a property has to remain in reserve whereas in the Amazon forest this amou...
متن کاملA Security Threat Analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs)
This document presents a security threat analysis for the Routing Protocol for Low-Power and Lossy Networks (RPLs). The development builds upon previous work on routing security and adapts the assessments to the issues and constraints specific to low-power and lossy networks. A systematic approach is used in defining and evaluating the security threats. Applicable countermeasures are applicatio...
متن کاملComputer Viruses – from an Annoyance to a Serious Threat
All product names referenced herein are trademarks or registered trademarks of their respective companies. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior ...
متن کاملOpportunity or Threat to Security ?
Between February 20 and 27, 2003, under the code name ‘Schriever II’, friendly ‘blue’ forces faced ‘red’ enemy forces during 8 days of a fierce battle in outer space. More than 300 military and civilian experts from more than 30 US agencies participated in this space war that took place 14 years in the future. Schriever II was only a war game, set in the year 2017! It took place at Schriever Ai...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ذخیره در منابع من قبلا به منابع من ذحیره شده{@ msg_add @}
عنوان ژورنال
دوره 8 شماره 1
صفحات 16- 27
تاریخ انتشار 2012-03
با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023