TY - JOUR
T1 - A configurable on-chip glitchy-clock generator for fault injection experiments
AU - Endo, Sho
AU - Sugawara, Takeshi
AU - Homma, Naofumi
AU - Aoki, Takafumi
AU - Satoh, Akashi
PY - 2012/1
Y1 - 2012/1
N2 - This paper presents a glitchy-clock generator integrated in FPGA for evaluating fault injection attacks and their countermeasures on cryptographic modules. The proposed generator exploits clock management capabilities, which are common in modern FPGAs, to generate clock signal with temporal voltage spike. The shape and timing of the glitchyclock cycle are configurable at run time. The proposed generator can be embedded in a single FPGA without any external instrument (e.g., a pulse generator and a variable power supply). Such integration enables reliable and reproducible fault injection experiments. In this paper, we examine the characteristics of the proposed generator through experiments on Sidechannel Attack Standard Evaluation Board (SASEBO). The result shows that the timing of the glitches can be controlled at the step of about 0.17 ns. We also demonstrate its application to the safe-error attack against an RSA processor.
AB - This paper presents a glitchy-clock generator integrated in FPGA for evaluating fault injection attacks and their countermeasures on cryptographic modules. The proposed generator exploits clock management capabilities, which are common in modern FPGAs, to generate clock signal with temporal voltage spike. The shape and timing of the glitchyclock cycle are configurable at run time. The proposed generator can be embedded in a single FPGA without any external instrument (e.g., a pulse generator and a variable power supply). Such integration enables reliable and reproducible fault injection experiments. In this paper, we examine the characteristics of the proposed generator through experiments on Sidechannel Attack Standard Evaluation Board (SASEBO). The result shows that the timing of the glitches can be controlled at the step of about 0.17 ns. We also demonstrate its application to the safe-error attack against an RSA processor.
KW - Clock glitch
KW - Faulty injection attacks
KW - RSA
KW - Safe-error attack
UR - http://www.scopus.com/inward/record.url?scp=84855321162&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84855321162&partnerID=8YFLogxK
U2 - 10.1587/transfun.E95.A.263
DO - 10.1587/transfun.E95.A.263
M3 - Article
AN - SCOPUS:84855321162
SN - 0916-8508
VL - E-95-A
SP - 263
EP - 266
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 1
ER -