Successful Attack on an FPGA-based Automatically Placed and Routed WDDL+ Crypto Processor
نویسندگان
چکیده
In this paper, we report the first successful attack on a DES crypto co-processor protected by the “Positive” Wave Dynamic Differential Logic (WDDL+) and embedded in a Field Programmable Gates Array (FPGA). This attack is unambiguous as the full key is retrieved. We experimentally show that this countermeasure resists to Differential Power Analysis (DPA), but can be broken by a totally non-invasive Electro-Magnetic Analysis (EMA) method. The method relies on two stages, the first being a localisation phase by means of cartography, and the second being the EMA attack on the most relevant area.
منابع مشابه
Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs
Power-equalization schemes for digital circuits aim to harden cryptographic designs against power analysis attacks. With respect to dual-rail logics most of these schemes have originally been designed for ASIC platforms, but much efforts have been spent to map them to FPGAs as well. A particular challenge is here to apply those schemes to the predefined logic structures of FPGAs (i.e., slices, ...
متن کاملA Standard Cell-Based DPA Attack Countermeasure using Homogeneous Dual-Rail Logic (HDRL)
DPA (Differential Power Analysis) attacks statistically find the correlation between power consumption and secret data in crypto-hardware. WDDL (Wave Dynamic Differential Logic) is a standard cell-based countermeasure for DPA and guarantees a 100% switching factor to shield the power information. However, our experiments observe that WDDL fails to compensate the power imbalance. This paper prop...
متن کاملA Secure Programmable Architecture with a Dedicated Tech-mapping Algorithm: Application to a Crypto-processor
With worldwide communications, information technology and confidentiality have become a major issue for exchanging and securing data. Nevertheless the ASIC high costs and the frequent updates in cryptographic standards used in security applications such as homeland security or banking have made the ciphering algorithms on an embedded FPGA (e-FPGA) co-processor a viable alternative. This paper p...
متن کاملHardware Based Strategies Against Side - Channel - Attack Implemented in WDDL
This contribution discusses cryptographic algorithm in hardware that protects the information leaks out of the device through so called „side channels“. Attacks on crypto-processors are based on analyses of the leaked data are known as sidechannel attacks (SCA). Important information, such as secret keys, can be obtained by observing the power consumption, the electromagnetic radiation, the tim...
متن کاملAn FPGA Implementation of Chaos based Image Encryption and its Performance Analysis
Today, hardware chip design with FPGA implementation for designing secure crypto processor is a growing topic due to rapidly increasing attack on digital images over internet network. In this paper, an FPGA implementation of Chaotic Map based two phase image encryption technique is proposed. First phase consists of pixel position permutation and second phase consists of bit value position permu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008