Design and characterisation of an AES chip embedding countermeasures

  • Authors:
  • Jacques Fournier;Jean-Baptiste Rigaud;Sylvain Bouquet;Bruno Robisson;Assia Tria;Jean-Max Dutertre;Michel Agoyan

  • Affiliations:
  • CEA-LETI Minatec, CMPGC, 880 Route de Mimet, 13541 Gardanne, France.;Ecole Nationale Supérieure des Mines de Saint Etienne, CMPGC, 880 Route de Mimet, 13541 Gardanne, France;CEA-LETI Minatec, CMPGC, 880 Route de Mimet, 13541 Gardanne, France.;CEA-LETI Minatec, CMPGC, 880 Route de Mimet, 13541 Gardanne, France.;CEA-LETI Minatec, CMPGC, 880 Route de Mimet, 13541 Gardanne, France.;Ecole Nationale Supérieure des Mines de Saint Etienne, CMPGC, 880 Route de Mimet, 13541 Gardanne, France.;CEA-LETI Minatec, CMPGC, 880 Route de Mimet, 13541 Gardanne, France.

  • Venue:
  • International Journal of Intelligent Engineering Informatics
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In critical communication infrastructures, hardware accelerators are often used to speed up cryptographic calculations. Their resistance to physical attacks determines how secure the overall infrastructure is. In this paper, we describe the implementation and characterisation of an AES accelerator embedding security features against physical attacks. This AES chip is implemented in HCMOS9gp 130 nm STM technology. The countermeasure is based on duplication and works on complemented values in parallel. The chip was tested against side channel attacks showing the efficiency of the proposed countermeasure against such attacks. Fault injection tests based on the use of local laser shoots showed that the fault detection mechanism did indeed react as expected. However, using clock set-up time violations, 80% of the secret key were retrieved in less than 40 hours, thus illustrating the limits of the duplication countermeasure against a global fault attack which was published after the chip was designed.