A cost-effective FPGA-based fault simulation environment

Angelika Janning, Johann Heyszl, Frederic Stumpf, Georg Sigl

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

In this contribution, we present an FPGA-based simulation environment for fault attacks on cryptographic hardware designs. With our methodology, we are able to simulate the effects of global fault attacks from e.g., spikes and local attacks from e.g., focused laser beams. The environment simulates transient bit-flip faults in sequential elements of a digital design. In this way it is tailored to the simulation of fault attacks on cryptographic designs. It is a tool to verify the design's behaviour in case of fault attacks and to verify implemented countermeasures. The environment is script-based for fully automated modification of the digital design and simulation. It can handle designs in VHDL as well as in Verilog language and does not require modifications to the design's source code. We used our environment in a case study and successfully tested the effectiveness of a fault detection countermeasure in an elliptic curve cryptography design.

Original languageEnglish
Title of host publicationProceedings - 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011
Pages21-31
Number of pages11
DOIs
StatePublished - 2011
Event8th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011 - Nara, Japan
Duration: 28 Sep 201128 Sep 2011

Publication series

NameProceedings - 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011

Conference

Conference8th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2011
Country/TerritoryJapan
CityNara
Period28/09/1128/09/11

Keywords

  • ECC case study
  • FPGA
  • Xilinx
  • cryptographic implementations simulation
  • fault attack
  • low-cost

Fingerprint

Dive into the research topics of 'A cost-effective FPGA-based fault simulation environment'. Together they form a unique fingerprint.

Cite this