差分发射分析在FPGA上的验证

J. D. Battista, P. Perdu, J. Courrège, B. Rouzeyre, L. Torres
{"title":"差分发射分析在FPGA上的验证","authors":"J. D. Battista, P. Perdu, J. Courrège, B. Rouzeyre, L. Torres","doi":"10.1109/ICSCS.2009.5412598","DOIUrl":null,"url":null,"abstract":"Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Validation of differential light emission analysis on FPGA\",\"authors\":\"J. D. Battista, P. Perdu, J. Courrège, B. Rouzeyre, L. Torres\",\"doi\":\"10.1109/ICSCS.2009.5412598\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.\",\"PeriodicalId\":126072,\"journal\":{\"name\":\"2009 3rd International Conference on Signals, Circuits and Systems (SCS)\",\"volume\":\"144 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 3rd International Conference on Signals, Circuits and Systems (SCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCS.2009.5412598\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCS.2009.5412598","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

故障分析工具和方法可以用于安全目的,安全攻击技术也可以用于故障分析。在本文中,我们描述了最近获得的关于光发射技术及其用于建立侧通道方法的结果。从密码分析师的角度来看,光发射可能是一个潜在的泄漏源。当研究在设备中实现的特定密码算法时,通过分析这种新型泄漏,可以检索机密敏感数据。我们在FPGA设备上进行了分析,这使得攻击比在标准ASIC上更难执行。此外,该技术在0.13 μ m技术的设备上进行了验证,从而从背面制备更复杂的样品。我们将展示,由于CMOS电路正常工作期间发出的光的泄漏,可以用来建立基于众所周知的DPA技术的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Validation of differential light emission analysis on FPGA
Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信