{"title":"在管道中使用FIFO增强硬件安全性","authors":"K. Lin, C. Weng, Tsai Kun Hou","doi":"10.1109/ISIAS.2011.6122844","DOIUrl":null,"url":null,"abstract":"Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Enhance hardware security using FIFO in pipelines\",\"authors\":\"K. Lin, C. Weng, Tsai Kun Hou\",\"doi\":\"10.1109/ISIAS.2011.6122844\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.\",\"PeriodicalId\":139268,\"journal\":{\"name\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 7th International Conference on Information Assurance and Security (IAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIAS.2011.6122844\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122844","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.