22 research outputs found

    Platform for Testing and Evaluation of PUF and TRNG Implementations in FPGAs

    Get PDF
    Implementation of cryptographic primitives like Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs) depends significantly on the underlying hardware. Common evaluation boards offered by FPGA vendors are not suitable for a fair benchmarking, since they have different vendor dependent configuration and contain noisy switching power supplies. The proposed hardware platform is primary aimed at testing and evaluation of cryptographic primitives across different FPGA and ASIC families. The modular platform consists of a motherboard and exchangeable daughter board modules. These are designed to be as simple as possible to allow cheap and independent evaluation of cryptographic blocks and namely PUFs. The motherboard is based on the Microsemi SmartFusion 2 SoC FPGA. It features a low-noise power supply, which simplifies evaluation of vulnerability to the side channel attacks. It provides also means of communication between the PC and the daughter module. Available software tools can be easily customized, for example to collect data from the random number generator located in the daughter module and to read it via USB interface. The daughter module can be plugged into the motherboard or connected using an HDMI cable to be placed inside a Faraday cage or a temperature control chamber. The whole platform was designed and optimized to fullfil the European HECTOR project (H2020) requirements

    A Side-Channel Attack Against the Secret Permutation on an Embedded McEliece Cryptosystem

    No full text
    International audience—In this paper, based on a thorough analysis of the state of the art, we point out a missing solution for embedded devices to secure the syndrome computation. We show that this weakness can open the door to a side-channel attack targeting the secret permutation. Indeed, brute-force attack iterations are dramatically decreased when the secret permutation is recovered. We demonstrate the feasibility of this attack against the McEliece cryptosystem implemented on an ARM Cortex-M3 microprocessor using Goppa codes. We explain how to recover the secret permutation on a toy example. Finally, we propose a promising countermeasure, which can be implemented in embedded devices to prevent this attack

    Countermeasure against the SPA attack on an embedded McEliece cryptosystem

    No full text
    International audience—In this paper, we present a novel countermeasure against a simple power analysis based side channel attack on a software implementation of the McEliece public key cryptosys-tem. First, we attack a straightforward C implementation of the Goppa codes based McEliece decryption running on an ARM Cortex-M3 microprocessor. Next, we demonstrate on a realistic example that using a " chosen ciphertext attack " method, it is possible to recover the complete secret permutation matrix. We show that this matrix can be completely recovered by an analysis of a dynamic power consumption of the microprocessor. Then, we estimate the brute-force attack complexity reduction depending on the knowledge of the permutation matrix. Finally, we propose an efficient software countermeasure having low computational complexity. Of course, we provide all the necessary details regarding the attack implementation and all the consequences of the proposed countermeasure especially in terms of power consumption

    Two Methods of Rijndael Implementation in

    No full text
    This paper presents an evaluation of the Rijndael cipher, the Advanced Encryption Standard winner, from the viewpoint of its implementation in a Field Programmable Devices (FPD). Starting with an analysis of algorithm's general characteristics a general cipher structure is described. Two di#erent methods of Rijndael algorithm mapping to FPD are analyzed and suitability of available FPD families is evaluated

    Low-cost ARM Cortex-M0 Based TRNG for IoT Applications

    No full text
    The Internet of Things (IoT) is one of perspective electronic sectors. In the near future a lot of common devices from a refrigerator to a door lock will be connected to the internet. Protection of the IoT devices should not be neglected. The device security is composed of many safety levels, where every countermeasure increases its robustness. The paper describes an implementation of a True Random Number Generator (TRNG) used in many cryptographic algorithms and protocols. It is based on a modern low-cost and low-power STM32F050 ARM-M0 microcontroller, suitable especially for IoT applications. The main motivation for developing of such generator was its absence in lower members of microcontroller families. Integrated TRNG uses common features of the microcontroller, which may be portable across ARM-M0 architecture. A source of randomness is instability of internal RC oscillator, which is acquired using another faster clock and one timer. The paper follows a previous research, but using the modern microcontroller with proposed on-line embedded tests which are designed in order to be simple and effective
    corecore