Suppr超能文献

使用模数转换器保护基于现场可编程门阵列的加密硬件实现免受故障攻击。

Protecting FPGA-Based Cryptohardware Implementations from Fault Attacks Using ADCs.

作者信息

Potestad-Ordóñez Francisco Eugenio, Casado-Galán Alejandro, Tena-Sánchez Erica

机构信息

Escuela Politécnica Superior, Universidad de Sevilla, 41011 Seville, Spain.

Instituto de Microelectrónica de Sevilla, IMSE-CNM (CSIC; Universidad de Sevilla), 41092 Seville, Spain.

出版信息

Sensors (Basel). 2024 Feb 29;24(5):1598. doi: 10.3390/s24051598.

Abstract

The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have proven to be mathematically secure against brute force due to the key length, but their physical implementations are vulnerable against physical attacks. The physical implementation of these algorithms can result in the disclosure of information that can be used to access confidential data. Some of the most powerful hardware attacks presented in the literature are called fault injection attacks. These attacks involve introducing a malfunction into the normal operation of the device and then analyzing the data obtained by comparing them with the expected behavior. Some of the most common methods for injecting faults are the variation of the supply voltage and temperature or the injection of electromagnetic pulses. In this paper, a hardware design methodology using analog-to-digital converters (ADCs) is presented to detect attacks on cryptocircuits and prevent information leakage during fault injection attacks. To assess the effectiveness of the proposed design approach, FPGA-based ADC modules were designed that detect changes in temperature and supply voltage. Two setups were implemented to test the scheme against voltage and temperature variations and injections of electromagnetic pulses. The results obtained demonstrate that, in 100% of the cases, when the correct operating voltage and temperature range were established, the detectors could activate an alarm signal when the cryptographic module was attacked, thus avoiding confidential information leakage and protecting data from being exploited.

摘要

连接设备之间交换的大多数数据都是机密的,必须防止未经授权的访问。为确保数据保护,人们使用了所谓的加密算法。由于密钥长度,这些算法在数学上已被证明对暴力破解具有安全性,但其物理实现容易受到物理攻击。这些算法的物理实现可能导致信息泄露,而这些信息可被用于访问机密数据。文献中介绍的一些最强大的硬件攻击被称为故障注入攻击。这些攻击包括在设备的正常运行中引入故障,然后通过将获得的数据与预期行为进行比较来分析这些数据。一些最常见的注入故障的方法是改变电源电压和温度或注入电磁脉冲。本文提出了一种使用模数转换器(ADC)的硬件设计方法,以检测对加密电路的攻击,并防止在故障注入攻击期间信息泄露。为评估所提出设计方法的有效性,设计了基于现场可编程门阵列(FPGA)的ADC模块,用于检测温度和电源电压的变化。实施了两种设置来针对电压和温度变化以及电磁脉冲注入测试该方案。获得的结果表明,在100%的情况下,当建立了正确的工作电压和温度范围时,探测器在加密模块受到攻击时能够激活警报信号,从而避免机密信息泄露并保护数据不被利用。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/97e6/10935379/451dc57a28d3/sensors-24-01598-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验