Por favor, use este identificador para citar o enlazar a este item: http://hdl.handle.net/10261/195257
COMPARTIR / EXPORTAR:
logo share SHARE logo core CORE BASE
Visualizar otros formatos: MARC | Dublin Core | RDF | ORE | MODS | METS | DIDL | DATACITE

Invitar a revisión por pares abierta
Título

Vulnerability analysis of trivium FPGA implementations

AutorPotestad-Ordoñez, Francisco E. CSIC ORCID; Jiménez Fernández, Carlos Jesús CSIC ORCID; Valencia-Barrero, M. CSIC ORCID
Palabras claveFault attack
field-programmable gate array (FPGA) implementation
Stream ciphers
Trivium
vulnerability analysis
Fecha de publicación28-sep-2017
EditorInstitute of Electrical and Electronics Engineers
CitaciónIEEE Transactions on Very Large Scale Integration (VLSI) Systems 25(12): 3380-3389 (2017)
ResumenToday, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT) demand the development of devices that ensure secure communications, preventing malicious agents from tapping sensitive data. Indeed, information security is one of the key challenges to address within the IoT field. Due to the strong resource constraints in some IoT applications, cryptographic algorithms affording lightweight implementations have been proposed. They constitute the so-called lightweight cryptography. A prominent example is the Trivium stream cipher, one of the finalists of the eSTREAM project. Although cryptographic algorithms are certainly simpler, one of their most critical vulnerability sources in terms of hardware implementations is side channel attacks. In this paper, it is studied the vulnerability of field-programmable gate array (FPGA) implementations of Trivium stream ciphers against fault attacks. The design and implementation of a system that alters the clock signal and checks the outcome is also described. A comparison between real and simulated fault injections is carried out in order to examine their veracity. The vulnerability of different versions of the Trivium cipher and their routing dependences has been tested in two different FPGA families. The results show that all versions of the Trivium cipher are vulnerable to fault attacks, although some versions are more vulnerable than others.
Versión del editorhttps://doi.org/10.1109/TVLSI.2017.2751151
URIhttp://hdl.handle.net/10261/195257
DOI10.1109/TVLSI.2017.2751151
ISSN1063-8210
E-ISSN1557-9999
Aparece en las colecciones: (IMSE-CNM) Artículos




Ficheros en este ítem:
Fichero Descripción Tamaño Formato
accesoRestringido.pdf15,38 kBAdobe PDFVista previa
Visualizar/Abrir
Mostrar el registro completo

CORE Recommender

SCOPUSTM   
Citations

16
checked on 21-abr-2024

WEB OF SCIENCETM
Citations

15
checked on 27-feb-2024

Page view(s)

172
checked on 28-abr-2024

Download(s)

25
checked on 28-abr-2024

Google ScholarTM

Check

Altmetric

Altmetric


NOTA: Los ítems de Digital.CSIC están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.