Enhance hardware security using FIFO in pipelines
Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attack...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 349 |
---|---|
container_issue | |
container_start_page | 344 |
container_title | |
container_volume | |
creator | Kuan Jen Lin Chih Ping Weng Tsai Kun Hou |
description | Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages. |
doi_str_mv | 10.1109/ISIAS.2011.6122844 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6122844</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6122844</ieee_id><sourcerecordid>6122844</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-7fa4f567024ee98807e9228a34c0410cad6647531cc9b66aff17455c52e87d473</originalsourceid><addsrcrecordid>eNpVj8FqwzAQRFVKoSXxD7QX_YBdrbzSWscQ4tYQyCG5B1VeNSqpMVZCyd830Fw6l-FdhjdCPIOqAJR77bbdYltpBVBZ0LpBvBOFowbQEGkwhu7_MapHUeT8pa6x1mk0TwJWw8EPgeXBT_2Pn1hmDucpnS7ynNPwKduu3cg0yDGNfEwD57l4iP6Yubj1TOza1W75Xq43b91ysS6TU6eSosdoLCmNzK5pFLG7Kvoag0JQwffWIpkaQnAf1voYgdCYYDQ31CPVM_HyN5uYeT9O6dtPl_3tZ_0LE4dEcg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Enhance hardware security using FIFO in pipelines</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kuan Jen Lin ; Chih Ping Weng ; Tsai Kun Hou</creator><creatorcontrib>Kuan Jen Lin ; Chih Ping Weng ; Tsai Kun Hou</creatorcontrib><description>Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.</description><identifier>ISBN: 9781457721540</identifier><identifier>ISBN: 1457721546</identifier><identifier>EISBN: 9781457721557</identifier><identifier>EISBN: 9781457721533</identifier><identifier>EISBN: 1457721538</identifier><identifier>EISBN: 1457721554</identifier><identifier>DOI: 10.1109/ISIAS.2011.6122844</identifier><language>eng</language><publisher>IEEE</publisher><subject>AES ; Clocks ; Cryptographic hardware ; Cryptography ; DPA attack ; Hardware ; Pipeline processing ; Pipelines ; Power demand ; Registers ; Temporal jitter</subject><ispartof>2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.344-349</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6122844$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27923,54918</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6122844$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kuan Jen Lin</creatorcontrib><creatorcontrib>Chih Ping Weng</creatorcontrib><creatorcontrib>Tsai Kun Hou</creatorcontrib><title>Enhance hardware security using FIFO in pipelines</title><title>2011 7th International Conference on Information Assurance and Security (IAS)</title><addtitle>ISIAS</addtitle><description>Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.</description><subject>AES</subject><subject>Clocks</subject><subject>Cryptographic hardware</subject><subject>Cryptography</subject><subject>DPA attack</subject><subject>Hardware</subject><subject>Pipeline processing</subject><subject>Pipelines</subject><subject>Power demand</subject><subject>Registers</subject><subject>Temporal jitter</subject><isbn>9781457721540</isbn><isbn>1457721546</isbn><isbn>9781457721557</isbn><isbn>9781457721533</isbn><isbn>1457721538</isbn><isbn>1457721554</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpVj8FqwzAQRFVKoSXxD7QX_YBdrbzSWscQ4tYQyCG5B1VeNSqpMVZCyd830Fw6l-FdhjdCPIOqAJR77bbdYltpBVBZ0LpBvBOFowbQEGkwhu7_MapHUeT8pa6x1mk0TwJWw8EPgeXBT_2Pn1hmDucpnS7ynNPwKduu3cg0yDGNfEwD57l4iP6Yubj1TOza1W75Xq43b91ysS6TU6eSosdoLCmNzK5pFLG7Kvoag0JQwffWIpkaQnAf1voYgdCYYDQ31CPVM_HyN5uYeT9O6dtPl_3tZ_0LE4dEcg</recordid><startdate>201112</startdate><enddate>201112</enddate><creator>Kuan Jen Lin</creator><creator>Chih Ping Weng</creator><creator>Tsai Kun Hou</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201112</creationdate><title>Enhance hardware security using FIFO in pipelines</title><author>Kuan Jen Lin ; Chih Ping Weng ; Tsai Kun Hou</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-7fa4f567024ee98807e9228a34c0410cad6647531cc9b66aff17455c52e87d473</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>AES</topic><topic>Clocks</topic><topic>Cryptographic hardware</topic><topic>Cryptography</topic><topic>DPA attack</topic><topic>Hardware</topic><topic>Pipeline processing</topic><topic>Pipelines</topic><topic>Power demand</topic><topic>Registers</topic><topic>Temporal jitter</topic><toplevel>online_resources</toplevel><creatorcontrib>Kuan Jen Lin</creatorcontrib><creatorcontrib>Chih Ping Weng</creatorcontrib><creatorcontrib>Tsai Kun Hou</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kuan Jen Lin</au><au>Chih Ping Weng</au><au>Tsai Kun Hou</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Enhance hardware security using FIFO in pipelines</atitle><btitle>2011 7th International Conference on Information Assurance and Security (IAS)</btitle><stitle>ISIAS</stitle><date>2011-12</date><risdate>2011</risdate><spage>344</spage><epage>349</epage><pages>344-349</pages><isbn>9781457721540</isbn><isbn>1457721546</isbn><eisbn>9781457721557</eisbn><eisbn>9781457721533</eisbn><eisbn>1457721538</eisbn><eisbn>1457721554</eisbn><abstract>Cryptographic functions are foundation of many information security applications. Embedded cryptographic hardware is vulnerable to side channel attacks such as power analysis- and fault- attacks. In this paper, we propose a design architecture which enhances the hardware security against such attacks. The key idea is to insert FIFOs in between two successive pipeline stages and randomly vary the duration when the data stay at FIFOs in every pipeline loop. This can make the time instant of executing certain operation unpredictable. The more timing variation appears, the less probability the attack succeeds. The proposed approach provides more possible configurations than previous approaches as well as it can be realized in both ASIC and FPGA implementations. We implemented the required controller and data path. Furthermore, the AES (Advanced Encryption Standard) algorithm was realized with the proposed pipeline of four stages.</abstract><pub>IEEE</pub><doi>10.1109/ISIAS.2011.6122844</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457721540 |
ispartof | 2011 7th International Conference on Information Assurance and Security (IAS), 2011, p.344-349 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6122844 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | AES Clocks Cryptographic hardware Cryptography DPA attack Hardware Pipeline processing Pipelines Power demand Registers Temporal jitter |
title | Enhance hardware security using FIFO in pipelines |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T14%3A33%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Enhance%20hardware%20security%20using%20FIFO%20in%20pipelines&rft.btitle=2011%207th%20International%20Conference%20on%20Information%20Assurance%20and%20Security%20(IAS)&rft.au=Kuan%20Jen%20Lin&rft.date=2011-12&rft.spage=344&rft.epage=349&rft.pages=344-349&rft.isbn=9781457721540&rft.isbn_list=1457721546&rft_id=info:doi/10.1109/ISIAS.2011.6122844&rft_dat=%3Cieee_6IE%3E6122844%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781457721557&rft.eisbn_list=9781457721533&rft.eisbn_list=1457721538&rft.eisbn_list=1457721554&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6122844&rfr_iscdi=true |