Updates on the security of FPGAs against power analysis attacks

30Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper reports on the security of cryptographic algorithms implemented on FPGAs against power analysis attacks. We first present some improved experiments against these reconfigurable devices, due to an improved measurement process. Although it is usually believed that FPGAs are noisy targets for such attacks, it is shown that simple power consumption models can nearly perfectly correlate with actual measurements. Then, we evaluate how these correlation values depend on the resources used in the FPGAs. Finally, we investigate the possibility to counteract these attacks by using random pre-charges in the devices and determine how this technique allows a designer to increase the security of an implementation. These results confirm that side-channel attacks present a serious threat for most microelectronic devices, including FPGAs. To conclude, we discuss the security vs. efficiency tradeoffs. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Standaert, F. X., Mace, F., Peeters, E., & Quisquater, J. J. (2006). Updates on the security of FPGAs against power analysis attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3985 LNCS, pp. 335–346). Springer Verlag. https://doi.org/10.1007/11802839_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free