Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
This paper dealt with an FPGA based test bed used for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this fault injection. The pre-build serial International Data Encryption (IDEA) algorithm synthesis models (.ngc files) will be used as test encryption algorithm. A main objective of our research is to develop an efficient method for protecting FPGAbased implementations of cryptographic algorithms through effective concurrent testing of various types of faults, including faults injected by the attackers. An essential part of this research is to develop a method and tool for the evaluation of susceptibility of FPGA-based circuits to fault injection attacks. In this paper, we present such a method and tool. It allows us to examine an FPGA-based circuit, in particular an implementation of a cryptographic algorithm, subjected to a fault injection attack based on clock glitching. The effectiveness of the proposed approach is assessed for the IDEA implementation.
Authors and Affiliations
K. Durga Rajasekhar, O. Sudha Bharathi, K. Sirisha, R. Satish Kumar
Real Time Infants monitoring by developing an Embedded Device for incubator
An Incubator is an apparatus for maintaining an infant, especially one that is ill or born before the usual gestation period. Continuous monitoring of physiological parameters is very often necessary for the evaluatio...
Empowering the Privacy in Online Social Networks
Security is one of the converges that develops when correspondence get interceded in Online Social Networks (OSN) distinctive protection issues have been risen in the online interpersonal organization ,this paper cla...
Secret Sharing of Convergent Keys to Third Party Concept of Dekey
Data de-duplication is a method for eliminating redundant data copies and has been widely used in cloud storage provider to reduce the storage space and bandwidth. The arising challenge is to perform secure de-duplic...
Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography
In this paper, we propose and implement a new intrusion-detection system with ECC Algorithm specially designed for MANETs. The self-configuring ability of nodes in MANET made it popular among critical mission applica...
CLUMARE: A GUI Based Tool for Clustering Multidimensional Datasets Using Map Reduce
chiranjeevi416@gmail.com, Srinivas2804@gmail.com, parisakishore@gmail.com