2018 Conference on Design of Circuits and Integrated Systems (DCIS) 2018
DOI: 10.1109/dcis.2018.8681467
|View full text |Cite
|
Sign up to set email alerts
|

Floorplanning as a practical countermeasure against clock fault attack in Trivium stream cipher

Abstract: The fault injection in ciphers operation is a very successful mechanism to attack them. The inclusion of elements of protection against this kind of attacks is more and more necessary. These mechanisms are usually based on introducing redundancy, which leads to a greater consumption of resources or a longer processing time. This article presents how the introduction of placement restrictions on ciphers can make it difficult to inject faults by altering the clock signal. It is therefore a countermeasure that ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…For this type of ciphers, hardware redundancy is generally proposed as a solution; however, we have selected different countermeasures reported in the literature, focusing on the design level and countermeasures against power analysis. On the one hand, there is work [22], where an improved hardware design methodology is presented. This paper states that depending on the floorplanning used during the implementation process, it is possible to difficult fault injections, but does not constitute a countermeasure as such.…”
Section: Comparative With Other Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…For this type of ciphers, hardware redundancy is generally proposed as a solution; however, we have selected different countermeasures reported in the literature, focusing on the design level and countermeasures against power analysis. On the one hand, there is work [22], where an improved hardware design methodology is presented. This paper states that depending on the floorplanning used during the implementation process, it is possible to difficult fault injections, but does not constitute a countermeasure as such.…”
Section: Comparative With Other Schemesmentioning
confidence: 99%
“…In this table we have taken into account whether they are hardware or software oriented countermeasures, fault coverage, resource cost and frequency degradation. As it can be seen, in the case of [22], there are no fault coverage data since it is a design methodology to avoid non-invasive active faults on the Trivium cipher. The frequency costs of the different proposed designs range from 0.72 to 0.96.…”
Section: Comparative With Other Schemesmentioning
confidence: 99%