Presentation
Experimental and Timing Analysis Comparison of FPGA Trivium Implementations and their Vulnerability to Clock Fault Injection
Author/s | Potestad Ordóñez, Francisco Eugenio
Jiménez Fernández, Carlos Jesús Valencia Barrero, Manuel |
Department | Universidad de Sevilla. Departamento de Tecnología Electrónica |
Publication Date | 2016 |
Deposit Date | 2021-03-10 |
Published in |
|
ISBN/ISSN | 978-1-5090-4565-5 |
Abstract | The security of cryptocircuits is today threatened
not only by attacks on algorithms but also, and above all, by
attacks on the circuit implementations themselves. These are
known as side channel attacks. One variety ... The security of cryptocircuits is today threatened not only by attacks on algorithms but also, and above all, by attacks on the circuit implementations themselves. These are known as side channel attacks. One variety is the Active Fault Analysis attack, that can make a circuit vulnerable by changing its behavior in a certain way. This article presents an experimental fault insertion attack on an FPGA implementation of the Trivium stream cipher. It also compares the faults introduced with the faults expected after a timing analysis. The results show that this implementation is vulnerable to such attacks, and also that it is not possible to estimate the position of the inserted faults by means of timing analysis. |
Funding agencies | Ministerio de Economía y Competitividad (MINECO). España |
Project ID. | TEC2010-16870
TEC2013-45523-R CSIC 201550E039 |
Citation | Potestad Ordóñez, F.E., Jiménez Fernández, C.J. y Valencia Barrero, M. (2016). Experimental and Timing Analysis Comparison of FPGA Trivium Implementations and their Vulnerability to Clock Fault Injection. En DCIS 2016: Conference on Design of Circuits and Integrated Systems Granada, España: IEEE Computer Society. |
Files | Size | Format | View | Description |
---|---|---|---|---|
Experimental and timing analysis ... | 3.236Mb | [PDF] | View/ | |