• DocumentCode
    3084589
  • Title

    Multi-level attacks: An emerging security concern for cryptographic hardware

  • Author

    Ali, Sk Subidh ; Chakraborty, Rajat Subhra ; Mukhopadhyay, Debdeep ; Bhunia, Swarup

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Indian Inst. of Technol., Kharagpur, India
  • fYear
    2011
  • fDate
    14-18 March 2011
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as differential power analysis (DPA) and fault-based attacks. In addition, modern integrated circuit (IC) design and manufacturing follows a horizontal business model where different third-party vendors provide hardware, software and manufacturing services, thus making it difficult to ensure the trustworthiness of the entire process. Such business practices make the designs vulnerable to hard-to-detect malicious modifications by an adversary, termed as “Hardware Trojans”. In this paper, we show that malicious nexus between multiple parties at different stages of the design, manufacturing and deployment makes the attacks on cryptographic hardware more potent. We describe the general model of such an attack, which we refer to as Multi-level Attack, and provide an example of it on the hardware implementation of the Advanced Encryption Standard (AES) algorithm, where a hardware Trojan is embedded in the design. We then analytically show that the resultant attack poses a significantly stronger threat than that from a Trojan attack by a single adversary. We validate our theoretical analysis using power simulation results as well as hardware measurement and emulation on a FPGA platform.
  • Keywords
    cryptography; field programmable gate arrays; integrated circuit design; integrated circuit manufacture; invasive software; FPGA platform; advanced encryption standard; cryptographic hardware; differential power analysis; fault-based attacks; hardware implementations; hardware measurement; hardware trojans; horizontal business model; integrated circuit design; integrated circuit manufacturing; malicious nexus; multilevel attacks; security concern; software implementations; third-party vendors; Circuit faults; Encryption; Hardware; Integrated circuits; Manufacturing; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011
  • Conference_Location
    Grenoble
  • ISSN
    1530-1591
  • Print_ISBN
    978-1-61284-208-0
  • Type

    conf

  • DOI
    10.1109/DATE.2011.5763307
  • Filename
    5763307