J. D. Battista, P. Perdu, J. Courrège, B. Rouzeyre, L. Torres
{"title":"差分发射分析在FPGA上的验证","authors":"J. D. Battista, P. Perdu, J. Courrège, B. Rouzeyre, L. Torres","doi":"10.1109/ICSCS.2009.5412598","DOIUrl":null,"url":null,"abstract":"Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.","PeriodicalId":126072,"journal":{"name":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Validation of differential light emission analysis on FPGA\",\"authors\":\"J. D. Battista, P. Perdu, J. Courrège, B. Rouzeyre, L. Torres\",\"doi\":\"10.1109/ICSCS.2009.5412598\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.\",\"PeriodicalId\":126072,\"journal\":{\"name\":\"2009 3rd International Conference on Signals, Circuits and Systems (SCS)\",\"volume\":\"144 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 3rd International Conference on Signals, Circuits and Systems (SCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCS.2009.5412598\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 3rd International Conference on Signals, Circuits and Systems (SCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCS.2009.5412598","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Validation of differential light emission analysis on FPGA
Failure analysis tools and methods can be used for security purposes as well as the security attack techniques can be used in failure analysis. In this paper, we describe the last results obtained concerning light emission techniques and their use to set up a side channel methodology. From a cryptanalyst standpoint, the light emission could be a potential source of leakage. When studying a specific cipher algorithm implemented in a device, by analysing this new kind of leakage it is possible to retrieve secret sensitive data. We made our analyses on an FPGA device, which makes the attack harder to perform than on a standard ASIC. Furthermore, the technique was validated on a device in 0.13µm technology, resulting in a more complex sample preparation from backside. We will show that, the leakage due to the light emitted during normal operation of a CMOS circuit, can be used to set up an attack based on the well-known DPA technique.