Mostra el registre d'ítem simple

dc.contributor.authorLasheras Mas, Ana
dc.contributor.authorCanal Corretger, Ramon
dc.contributor.authorRodríguez Luna, Eva
dc.contributor.authorCassano, Luca
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2020-01-16T15:57:52Z
dc.date.available2020-01-16T15:57:52Z
dc.date.issued2019
dc.identifier.citationLasheras, A. [et al.]. Protecting RSA hardware accelerators against differential fault analysis through residue checking. A: IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems. "2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)". Institute of Electrical and Electronics Engineers (IEEE), 2019, p. 1-6.
dc.identifier.isbn978-1-7281-2260-1
dc.identifier.urihttp://hdl.handle.net/2117/175113
dc.description© 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
dc.description.abstractHardware accelerators for cryptographic algorithms are ubiquitously deployed in nowadays consumer and industrial products. Unfortunately, the HW implementations of such algorithms often suffer from vulnerabilities that expose systems to a number of attacks, among which differential fault analysis (DFA). It is therefore crucial to protect cryptographic circuits against such attacks in a cost-effective and power-efficient way. In this paper, we propose a lightweight technique for protecting circuits implementing the RSA algorithm against DFA. The proposed solution borrows residue checking from the traditional fault tolerance and applies it to RSA circuits in order to first detect the occurrence a fault and then to react to the attack by obfuscating the output values. An experimental campaign demonstrated that the proposed solution detects the 100% of the possible fault attacks while leading to a 2.85% area overhead, a 16.67% power consumption increase and with no operating frequency decrease.
dc.format.extent6 p.
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica::Criptografia
dc.subject.lcshPublic key cryptography
dc.subject.lcshFault-tolerant computing
dc.subject.otherAttack resistance
dc.subject.otherCryptographic hardware accelerators
dc.subject.otherDifferential fault analysis
dc.subject.otherHardware security
dc.titleProtecting RSA hardware accelerators against differential fault analysis through residue checking
dc.typeConference report
dc.subject.lemacCriptografia
dc.subject.lemacTolerància als errors (Informàtica)
dc.contributor.groupUniversitat Politècnica de Catalunya. VIRTUOS - Virtualisation and Operating Systems
dc.identifier.doi10.1109/DFT.2019.8875320
dc.identifier.dl19079069
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttps://ieeexplore.ieee.org/document/8875320
dc.rights.accessOpen Access
local.identifier.drac26236212
dc.description.versionPostprint (author's final draft)
local.citation.authorLasheras, A.; Canal, R.; Rodríguez, E.; Cassano, L.
local.citation.contributorIEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems
local.citation.publicationName2019 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)
local.citation.startingPage1
local.citation.endingPage6


Fitxers d'aquest items

Thumbnail

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple