2020
DOI: 10.46586/tches.v2021.i1.279-304
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Analysis of the Xilinx Zynq UltraScale+ Encryption Engine

Abstract: The Xilinx Zynq UltraScale+ (ZU+) is a powerful and flexible System-on- Chip (SoC) computing platform for next generation applications such as autonomous driving or industrial Internet-of-Things (IoT) based on 16 nm production technology. The devices are equipped with a secure boot mechanism in order to provide confidentiality, integrity, and authenticity of the configuration files that are loaded during power-up. This includes a dedicated encryption engine which features a protocol-based countermeasure agains… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In recent years, some hardware vendors have considered designing countermeasures for commercial crypto products to resist various physical attacks. For instance, Xilinx Zynq Ultracale+ (ZU+) Encryption Engine adopts proprietary countermeasures to resist SCA (Hettwer et al 2021). In this case, adversaries need to extract the secret key within limited data.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years, some hardware vendors have considered designing countermeasures for commercial crypto products to resist various physical attacks. For instance, Xilinx Zynq Ultracale+ (ZU+) Encryption Engine adopts proprietary countermeasures to resist SCA (Hettwer et al 2021). In this case, adversaries need to extract the secret key within limited data.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…Besides, some newest crypto products also adopt some specific protections to render adversaries' attack capability. For example, Zynq Ultracale+ (ZU+) Encryption Engine employs a key rolling scheme and Rivest Shamir Adleman (RSA) authentication to resist side-channel attacks (Hettwer et al 2021). Similar to NIST CTR_DRBG specification, ZU+ utilizes key rolling scheme in AES-CTR encryption.…”
Section: Introductionmentioning
confidence: 99%
“…However, the use of key-rolling comes with a performance-security trade-off. In [17], after thorough experimentation, it was found that to be protected against current side-channel attacks, the key-rolling factor has to be set between 20 and 30. This imposes a considerable performance overhead.…”
Section: Bitstream Encryptionmentioning
confidence: 99%
“…Most securitycritical FPGAs rely on bitstream encryption and authentication to avoid such Trojan insertions. However, these protection schemes have shown to be vulnerable to various physical [3]- [6] and mathematical attacks [7], leaving them susceptible to tampering. Consequently, in critical applications, where the chip is deployed in an untrusted field or could be accessed by untrusted parties, it should be possible to check the integrity of the hardware.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, due to their reconfigurability, they provide the possibility for malicious modifications even after the product has been shipped to the user. It has been shown that the key used for encrypting the bitstream on recent SRAM-based FPGAs can be extracted using SCA techniques [3]- [6]. With the extracted key at hand, the bitstream can be decrypted, modified, and stored as a replacement for the original bitstream [17].…”
Section: Introductionmentioning
confidence: 99%