Glitch and Laser Fault Attacks onto a Secure AES Implementation on a SRAM-Based FPGA |
| |
Authors: | G Canivet P Maistri R Leveugle J Cl??di??re F Valette M Renaudin |
| |
Affiliation: | (1) Computer Science Department, University of Bristol, Bristol, BS8 1UB, UK;(2) Institute for Applied Information Processing and Communication, Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria;(3) Infineon Technologies AG, Security Innovation, Am Campeon, 1-1285579 Neubiberg, Germany |
| |
Abstract: | Programmable devices are an interesting alternative when implementing embedded systems on a low-volume scale. In particular,
the affordability and the versatility of SRAM-based FPGAs make them attractive with respect to ASIC implementations. FPGAs
have thus been used extensively and successfully in many fields, such as implementing cryptographic accelerators. Hardware
implementations, however, must be protected against malicious attacks, e.g. those based on fault injections. Protections have
been usually evaluated on ASICs, but FPGAs can be vulnerable as well. This work presents thus fault injection attacks against
a secured AES architecture implemented on a SRAM-based FPGA. The errors are injected during the computation by means of voltage
glitches and laser attacks. To our knowledge, this is one of the first works dealing with dynamic laser fault injections.
We show that fault attacks on SRAM-based FPGAs may behave differently with respect to attacks against ASIC, and they need
therefore to be addressed by specific countermeasures, that are also discussed in this paper. In addition, we discuss the
different effects obtained by the two types of attacks. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|