DocumentCode :
3190916
Title :
Countermeasures against EM analysis for a secured FPGA-based AES implementation
Author :
Maistri, P. ; Tiran, Stefan ; Maurine, P. ; Koren, Israel ; Leveugle, R.
Author_Institution :
TIMA Lab., Univ. Grenoble Alpes, Grenoble, France
fYear :
2013
fDate :
9-11 Dec. 2013
Firstpage :
1
Lastpage :
6
Abstract :
Side-channel analysis is one of the most efficient techniques available to an attacker to break the security of a cryptographic device. Started as monitoring of computation time or power, it has evolved into considering several other possible information leakage sources, such as electromagnetic (EM) emissions. EM waves can be a very attractive means to attack a cryptographic implementation: they are contactless, and their intrinsic spatial, temporal, and frequency information can be a source of leakage richer than power consumption. Existing countermeasures may be thus insufficient against an EM attack and new solutions must be found and validated. In this paper, we describe a set of dedicated countermeasures protecting against EM analysis and validate them with real experimental campaigns on a Xilinx FPGA.
Keywords :
cryptography; field programmable gate arrays; EM analysis; EM emissions; Xilinx FPGA; cryptographic device; cryptographic implementation; electromagnetic emissions; information leakage sources; power consumption; secured FPGA based AES implementation; side channel analysis; Clocks; Encryption; Entropy; Registers; Robustness; Standards; AES; Advanced Encryption Standard; CEMA; CPA; EM; FPGA; countermeasures; side-channel analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reconfigurable Computing and FPGAs (ReConFig), 2013 International Conference on
Conference_Location :
Cancun
Print_ISBN :
978-1-4799-2078-5
Type :
conf
DOI :
10.1109/ReConFig.2013.6732274
Filename :
6732274
Link To Document :
بازگشت