22 research outputs found
Platform for Testing and Evaluation of PUF and TRNG Implementations in FPGAs
Implementation of cryptographic primitives like
Physical Unclonable Functions (PUFs) and True Random Number
Generators (TRNGs) depends significantly on the underlying
hardware. Common evaluation boards offered by FPGA vendors
are not suitable for a fair benchmarking, since they have different
vendor dependent configuration and contain noisy switching
power supplies. The proposed hardware platform is primary
aimed at testing and evaluation of cryptographic primitives
across different FPGA and ASIC families. The modular platform
consists of a motherboard and exchangeable daughter board
modules. These are designed to be as simple as possible to
allow cheap and independent evaluation of cryptographic blocks
and namely PUFs. The motherboard is based on the Microsemi
SmartFusion 2 SoC FPGA. It features a low-noise power supply,
which simplifies evaluation of vulnerability to the side channel
attacks. It provides also means of communication between the
PC and the daughter module. Available software tools can be
easily customized, for example to collect data from the random
number generator located in the daughter module and to read it
via USB interface. The daughter module can be plugged into
the motherboard or connected using an HDMI cable to be
placed inside a Faraday cage or a temperature control chamber.
The whole platform was designed and optimized to fullfil the
European HECTOR project (H2020) requirements
A Side-Channel Attack Against the Secret Permutation on an Embedded McEliece Cryptosystem
International audience—In this paper, based on a thorough analysis of the state of the art, we point out a missing solution for embedded devices to secure the syndrome computation. We show that this weakness can open the door to a side-channel attack targeting the secret permutation. Indeed, brute-force attack iterations are dramatically decreased when the secret permutation is recovered. We demonstrate the feasibility of this attack against the McEliece cryptosystem implemented on an ARM Cortex-M3 microprocessor using Goppa codes. We explain how to recover the secret permutation on a toy example. Finally, we propose a promising countermeasure, which can be implemented in embedded devices to prevent this attack
Countermeasure against the SPA attack on an embedded McEliece cryptosystem
International audience—In this paper, we present a novel countermeasure against a simple power analysis based side channel attack on a software implementation of the McEliece public key cryptosys-tem. First, we attack a straightforward C implementation of the Goppa codes based McEliece decryption running on an ARM Cortex-M3 microprocessor. Next, we demonstrate on a realistic example that using a " chosen ciphertext attack " method, it is possible to recover the complete secret permutation matrix. We show that this matrix can be completely recovered by an analysis of a dynamic power consumption of the microprocessor. Then, we estimate the brute-force attack complexity reduction depending on the knowledge of the permutation matrix. Finally, we propose an efficient software countermeasure having low computational complexity. Of course, we provide all the necessary details regarding the attack implementation and all the consequences of the proposed countermeasure especially in terms of power consumption
Two Methods of Rijndael Implementation in
This paper presents an evaluation of the Rijndael cipher, the Advanced Encryption Standard winner, from the viewpoint of its implementation in a Field Programmable Devices (FPD). Starting with an analysis of algorithm's general characteristics a general cipher structure is described. Two di#erent methods of Rijndael algorithm mapping to FPD are analyzed and suitability of available FPD families is evaluated
Low-cost ARM Cortex-M0 Based TRNG for IoT Applications
The Internet of Things (IoT) is one of perspective electronic sectors. In the near future a lot of
common devices from a refrigerator to a door lock will be connected to the internet.
Protection of the IoT devices should not be neglected. The device security is composed of many safety levels,
where every countermeasure increases its robustness.
The paper describes an implementation of a True Random Number Generator (TRNG) used in
many cryptographic algorithms and protocols.
It is based on a modern low-cost and low-power STM32F050 ARM-M0 microcontroller, suitable
especially for IoT applications. The main motivation for developing of such generator
was its absence in lower members of microcontroller families. Integrated TRNG uses common features
of the microcontroller, which may be portable across ARM-M0 architecture.
A source of randomness is instability of internal RC oscillator,
which is acquired using another faster clock and one timer.
The paper follows a previous research, but using the modern microcontroller
with proposed on-line embedded tests which are designed in order to be simple and effective