Potestad-Ordóñez Francisco Eugenio, Casado-Galán Alejandro, Tena-Sánchez Erica
Escuela Politécnica Superior, Universidad de Sevilla, 41011 Seville, Spain.
Instituto de Microelectrónica de Sevilla, IMSE-CNM (CSIC; Universidad de Sevilla), 41092 Seville, Spain.
Sensors (Basel). 2024 Feb 29;24(5):1598. doi: 10.3390/s24051598.
The majority of data exchanged between connected devices are confidential and must be protected against unauthorized access. To ensure data protection, so-called cryptographic algorithms are used. These algorithms have proven to be mathematically secure against brute force due to the key length, but their physical implementations are vulnerable against physical attacks. The physical implementation of these algorithms can result in the disclosure of information that can be used to access confidential data. Some of the most powerful hardware attacks presented in the literature are called fault injection attacks. These attacks involve introducing a malfunction into the normal operation of the device and then analyzing the data obtained by comparing them with the expected behavior. Some of the most common methods for injecting faults are the variation of the supply voltage and temperature or the injection of electromagnetic pulses. In this paper, a hardware design methodology using analog-to-digital converters (ADCs) is presented to detect attacks on cryptocircuits and prevent information leakage during fault injection attacks. To assess the effectiveness of the proposed design approach, FPGA-based ADC modules were designed that detect changes in temperature and supply voltage. Two setups were implemented to test the scheme against voltage and temperature variations and injections of electromagnetic pulses. The results obtained demonstrate that, in 100% of the cases, when the correct operating voltage and temperature range were established, the detectors could activate an alarm signal when the cryptographic module was attacked, thus avoiding confidential information leakage and protecting data from being exploited.
连接设备之间交换的大多数数据都是机密的,必须防止未经授权的访问。为确保数据保护,人们使用了所谓的加密算法。由于密钥长度,这些算法在数学上已被证明对暴力破解具有安全性,但其物理实现容易受到物理攻击。这些算法的物理实现可能导致信息泄露,而这些信息可被用于访问机密数据。文献中介绍的一些最强大的硬件攻击被称为故障注入攻击。这些攻击包括在设备的正常运行中引入故障,然后通过将获得的数据与预期行为进行比较来分析这些数据。一些最常见的注入故障的方法是改变电源电压和温度或注入电磁脉冲。本文提出了一种使用模数转换器(ADC)的硬件设计方法,以检测对加密电路的攻击,并防止在故障注入攻击期间信息泄露。为评估所提出设计方法的有效性,设计了基于现场可编程门阵列(FPGA)的ADC模块,用于检测温度和电源电压的变化。实施了两种设置来针对电压和温度变化以及电磁脉冲注入测试该方案。获得的结果表明,在100%的情况下,当建立了正确的工作电压和温度范围时,探测器在加密模块受到攻击时能够激活警报信号,从而避免机密信息泄露并保护数据不被利用。