Part 2: Invasive AttacksInternational audienceThe contribution of this paper is twofold: (1) a novel fault injection attack against AES, based on a new fault model, is proposed. Compared to state-of-the-art attacks, this fault model advantage is to relax constraints on the fault location, and then reduce the a priori knowledge on the implementation. Moreover, the attack algorithm is very simple and leaves room for optimization with respect to specific cases; (2) the fault attack is combined with side-channel analysis in order to defeat fault injection resistant and masked AES implementations. More precisely, our fault injection attack works well even when the attacker has only access to the faulty ciphertexts through a side-channel. Furthermore, the attacks presented in this paper can be extended to any SP-Network
Abstract. In side-channel analysis, the waveforms can be acquired misaligned. Several algorithms have been put forward to resynchronize signals, as a pretreatment before the attack proper. In this article, we examine two of them, namely amplitude-only and phase-only correlation (abridged AOC and POC), and introduce a third one, called threshold-POC (T-POC) that corrects a flaw of the phase-only correlation. Those three resynchronization algorithms are computationally efficient insofar as they find the correct displacement in O(n log n) steps per waveform made up of n samples.Former studies on resynchronization algorithms quantified their quality by their indirect effect on side-channel attacks. We introduce in this article a formal framework for the evaluation of the resynchronization algorithms per se. A benchmarking on representative waveforms shows that there is an adequation between the waveforms and the most suitable resynchronization algorithm. On unprotected circuits, the intrawaveform similarity in amplitude or in phase determines the choice for either the AOC or the POC algorithm. Circuits protected by hiding countermeasures have their amplitude made as constant as possible. Therefore, the intra-waveform similarity in amplitude is lowered and the POC is better. Circuits protected by masking countermeasures have their amplitude made as random as possible. Therefore, even if the intrawaveform similarity in amplitude is high, the inter-waveform similarity is reduced; hence a trade-off between AOC and POC, namely T-POC, is the most adequate resynchronization algorithm.
Abstract. In this paper, we present an efficient FPGA implementation of the SHA-3 hash function candidate Shabal [6]. Targeted at the recent Xilinx Virtex-5 FPGA family, our design achieves a relatively high throughput of 2 Gbit/s at a cost of only 153 slices, yielding a throughputvs.-area ratio of 13.4 Mbit/s per slice. Our work can also be ported to Xilinx Spartan-3 FPGAs, on which it supports a throughput of 800 Mbit/s for only 499 slices, or equivalently 1.6 Mbit/s per slice. According to the SHA-3 Zoo website [1], this work is among the smallest reported FPGA implementations of SHA-3 candidates, and ranks first in terms of throughput per area.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.