Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Journal of Cryptology Année : 2011

Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA

Résumé

Programmable devices are an interesting alternative when implementing embedded systems on a low-volume scale. In particular, the affordability and the versatility of SRAM-based FPGAs make them attractive with respect to ASIC implementations. FPGAs have thus been used extensively and successfully in many fields, such as implementing cryptographic accelerators. Hardware implementations, however, must be protected against malicious attacks, e.g. those based on fault injections. Protections have been usually evaluated on ASICs, but FPGAs can be vulnerable as well. This work presents thus fault injection attacks against a secured AES architecture implemented on a SRAM-based FPGA. The errors are injected during the computation by means of voltage glitches and laser attacks. To our knowledge, this is one of the first works dealing with dynamic laser fault injections. We show that fault attacks on SRAM-based FPGAs may behave differently with respect to attacks against ASIC, and they need therefore to be addressed by specific countermeasures, that are also discussed in this paper. In addition, we discuss the different effects obtained by the two types of attacks.

Dates et versions

hal-00550051 , version 1 (23-12-2010)

Identifiants

Citer

G. Canivet, Paolo Maistri, J. Clédière, Régis Leveugle, F. Valette, et al.. Glitch and laser fault attacks onto a secure AES implementation on a SRAM-based FPGA. Journal of Cryptology, 2011, 24 (2, April), pp.247-268. ⟨10.1007/s00145-010-9083-9⟩. ⟨hal-00550051⟩

Collections

UGA CNRS TIMA
97 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More