Enhance hardware security using FIFO in pipelines

K. Lin, C. Weng, Tsai Kun Hou
{"title":"Enhance hardware security using FIFO in pipelines","authors":"K. Lin, C. Weng, Tsai Kun Hou","doi":"10.1109/ISIAS.2011.6122844","DOIUrl":null,"url":null,"abstract":"Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122844","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.
在管道中使用FIFO增强硬件安全性
密码功能是许多信息安全应用的基础。嵌入式加密硬件容易受到侧信道攻击,如功率分析攻击和故障攻击。在本文中,我们提出了一种增强硬件安全性的设计体系结构。关键思想是在两个连续的管道阶段之间插入fifo,并随机改变每个管道循环中数据停留在fifo的持续时间。这可能会使执行某些操作的时间瞬间不可预测。时间变化越多,攻击成功的可能性就越小。该方法比以前的方法提供了更多可能的配置,并且可以在ASIC和FPGA实现中实现。我们实现了所需的控制器和数据路径。在此基础上,采用提出的四阶段流程实现了AES (Advanced Encryption Standard)算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信