2014
DOI: 10.1145/2629462
|View full text |Cite
|
Sign up to set email alerts
|

Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs

Abstract: To protect Field-Programmable Gate Array (FPGA) designs against Intellectual Property (IP) theft and related issues such as product cloning, all major FPGA manufacturers offer a mechanism to encrypt the bitstream that is used to configure the FPGA. From a mathematical point of view, the employed encryption algorithms (e.g., Advanced Encryption Standard (AES) or 3DES) are highly secure. However, it has been shown that the bitstream encryption feature of several FPGA families is susceptible to side-channel attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 34 publications
(18 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…However, this is not considered as impossible. Furthermore, attacks on the software development kits or FPGA hardware can be used to facilitate the intellectual property theft [19].…”
Section: A Intellectual Property Theftmentioning
confidence: 99%
See 4 more Smart Citations
“…However, this is not considered as impossible. Furthermore, attacks on the software development kits or FPGA hardware can be used to facilitate the intellectual property theft [19].…”
Section: A Intellectual Property Theftmentioning
confidence: 99%
“…The circuit leakages (power consumption, EM, temperature or timing variations) which reflect the activity during the decryption are correlated with the input data to reconstruct the key value, it is called the side-channel analysis (SCA). Some successful side-channel attacks have be reported for Altera Stratix-II and Stratix-III [19], Microsemi ProASIC3 [20] and Xilinx Virtex-II [21] that used bitstream AES-128 encryption. These papers demonstrate that SCA techniques are incredibly efficient with an affordable cost.…”
Section: ) Bitstream Decryption Key Stealingmentioning
confidence: 99%
See 3 more Smart Citations