Mostra el registre d'ítem simple

dc.contributor.authorLasheras Mas, Ana
dc.contributor.authorCanal Corretger, Ramon
dc.contributor.authorRodríguez Luna, Eva
dc.contributor.authorCassano, Luca
dc.contributor.otherUniversitat Politècnica de Catalunya. Departament d'Arquitectura de Computadors
dc.date.accessioned2020-12-21T13:07:22Z
dc.date.available2022-12-16T01:25:27Z
dc.date.issued2021-01
dc.identifier.citationLasheras, A. [et al.]. Securing RSA hardware accelerators through residue checking. "Microelectronics reliability", 2021, vol. 116, article 114021, p. 1-10.
dc.identifier.issn0026-2714
dc.identifier.urihttp://hdl.handle.net/2117/334734
dc.description.abstractCircuits for the hardware acceleration of cryptographic algorithms are ubiquitously deployed in consumer and industrial products. Although being secure from a mathematical point of view, such accelerators may expose several vulnerabilities strictly related to the hardware implementation. Differential fault analysis (DFA) and hardware Trojan horses (HWTs) may be exploited to steal secret information from the circuit or to interfere with its nominal functioning. It is therefore important to protect cryptographic hardware accelerators against such attacks in an efficient way. In this paper, we propose a lightweight technique for protecting circuits implementing the RSA algorithm against DFA and HWTs at runtime. The proposed solution relies on residue checking which is a well-known technique belonging to traditional fault tolerance. Residue checking is here applied to RSA circuits in order to detect any modification of the output of the circuit possibly induced by the occurrence of a fault or the activation of a HWT. When this happens, the protection technique reacts to the attack by obfuscating the circuit's output (i.e. generating a random output). An experimental campaign (99% confidence and 1% error) demonstrated that, when dealing with DFA, the proposed solution detected 100% of the fault attacks that leaked information to the attacker. Moreover, we applied the proposed technique to all the HWT infected implementations of the RSA algorithm available in the Trust-Hub benchmark suite achieving a 100% HWT detection. The overhead introduced by the proposed solution is a maximum area increase below 3%, about 18% dynamic power consumption increase while it has no impact on the operating frequency.
dc.format.extent10 p.
dc.language.isoeng
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights©2020 Elsevier
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectÀrees temàtiques de la UPC::Informàtica::Seguretat informàtica
dc.subject.lcshCryptography
dc.subject.lcshAlgorithms
dc.subject.lcshComputer security
dc.subject.otherCryptographic accelerators
dc.subject.otherDifferential fault analysis
dc.subject.otherFault attacks
dc.subject.otherHardware Trojans
dc.subject.otherHardware security
dc.subject.otherResidue checking
dc.subject.otherRSA
dc.subject.otherThird party intellectual property cores (3PIPs)
dc.titleSecuring RSA hardware accelerators through residue checking
dc.typeArticle
dc.subject.lemacCriptografia
dc.subject.lemacAlgorismes
dc.subject.lemacSeguretat informàtica
dc.contributor.groupUniversitat Politècnica de Catalunya. VIRTUOS - Virtualisation and Operating Systems
dc.identifier.doi10.1016/j.microrel.2020.114021
dc.description.peerreviewedPeer Reviewed
dc.relation.publisherversionhttps://www.sciencedirect.com/science/article/pii/S0026271420309082
dc.rights.accessOpen Access
local.identifier.drac30018881
dc.description.versionPostprint (author's final draft)
local.citation.authorLasheras, A.; Canal, R.; Rodríguez, E.; Cassano, L.
local.citation.publicationNameMicroelectronics reliability
local.citation.volume116
local.citation.numberarticle 114021
local.citation.startingPage1
local.citation.endingPage10


Fitxers d'aquest items

Thumbnail

Aquest ítem apareix a les col·leccions següents

Mostra el registre d'ítem simple