Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
This paper dealt with an FPGA based test bed used for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this fault injection. The pre-build serial International Data Encryption (IDEA) algorithm synthesis models (.ngc files) will be used as test encryption algorithm. A main objective of our research is to develop an efficient method for protecting FPGAbased implementations of cryptographic algorithms through effective concurrent testing of various types of faults, including faults injected by the attackers. An essential part of this research is to develop a method and tool for the evaluation of susceptibility of FPGA-based circuits to fault injection attacks. In this paper, we present such a method and tool. It allows us to examine an FPGA-based circuit, in particular an implementation of a cryptographic algorithm, subjected to a fault injection attack based on clock glitching. The effectiveness of the proposed approach is assessed for the IDEA implementation.
Authors and Affiliations
K. Durga Rajasekhar, O. Sudha Bharathi, K. Sirisha, R. Satish Kumar
Design of Fuzzy Controller For Bilateral Telemanipulator
The objective of a telerobotic system is to connect humans and robots in order to reproduce operator action at a distance. The telerobotic system consists of a ‘master’ robot, operated by a human arm, and a kinematica...
Securing SMS-based approach for two factor authentication
Nowadays most of the institution faces a huge problem related to security. Most of the institution uses the traditional way to provide authentication. That means most them are use passwords as an authentication mechan...
A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique
MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex p...
A Survey on Distributed Network Services Using SSO for Secure Mechanism
Methodologies presently use in single sign-on (SSO) for enable a legal user with a single credential to be authenticated by a multiple service providers in a distributed computer network. The earlier techniques cause...
HDRI (High Dynamic Range Image) Acquisition By Multiple Exposure Fusion
Innovative technologies in image capturing and image processing enable photographs with multiple exposures to be fused into high dynamic range images. Many such technologies came into existence. However, occasionally...