Title :
Hardware Designer´s Guide to Fault Attacks
Author :
Karaklajic, Dusko ; Schmidt, Jorn-Marc ; Verbauwhede, Ingrid
Author_Institution :
KU Leuven, Leuven-Heverlee, Belgium
Abstract :
Hardware designers invest a significant design effort when implementing computationally intensive cryptographic algorithms onto constrained embedded devices to match the computational demands of the algorithms with the stringent area, power, and energy budgets of the platforms. When it comes to designs that are employed in potential hostile environments, another challenge arises-the design has to be resistant against attacks based on the physical properties of the implementation, the so-called implementation attacks. This creates an extra design concern for a hardware designer. This paper gives an insight into the field of fault attacks and countermeasures to help the designer to protect the design against this type of implementation attacks. We analyze fault attacks from different aspects and expose the mechanisms they employ to reveal a secret parameter of a device. In addition, we classify the existing countermeasures and discuss their effectiveness and efficiency. The result of this paper is a guide for selecting a set of countermeasures, which provides a sufficient security level to meet the constraints of the embedded devices.
Keywords :
cryptography; embedded systems; integrated circuit design; microprocessor chips; computational demands; constrained embedded devices; cryptographic algorithms; fault attacks; hardware designer; implementation attacks; physical properties; security level; Algorithm design and analysis; Clocks; Cryptography; Hardware; Laser beams; Semiconductor lasers; Classification; countermeasures; embedded security; fault attacks;
Journal_Title :
Very Large Scale Integration (VLSI) Systems, IEEE Transactions on
DOI :
10.1109/TVLSI.2012.2231707