Design and characterisation of an AES chip embedding countermeasures

Abstract : In critical communication infrastructures, hardware accelerators are often used to speed up cryptographic calculations. Their resistance to physical attacks determines how secure the overall infrastructure is. In this paper, we describe the implementation and characterisation of an AES accelerator embedding security features against physical attacks. This AES chip is implemented in HCMOS9gp 130nm STM technology. The countermeasure is based on duplication and works on complemented values in parallel. The chip was tested against side-channel attacks showing the efficiency of the proposed countermeasure against such attacks. Fault injection tests based on the use of local laser shoots showed that the fault detection mechanism did indeed react as expected. However, using clock set-up time violations, 80% of the secret key were retrieved in less than 40 hours, thus illustrating the limits of the duplication countermeasure against a global fault attack which was published after the chip was designed.
Type de document :
Article dans une revue
International Journal of Intelligent Engineering Informatics, 2011, pp.00
Liste complète des métadonnées

Littérature citée [38 références]  Voir  Masquer  Télécharger
Contributeur : Jean-Max Dutertre <>
Soumis le : lundi 16 mars 2015 - 13:32:02
Dernière modification le : lundi 7 janvier 2019 - 14:12:03
Document(s) archivé(s) le : lundi 17 avril 2017 - 11:44:01


Fichiers produits par l'(les) auteur(s)


  • HAL Id : emse-00624400, version 1



Michel Agoyan, Sylvain Bouquet, Jean-Max Dutertre, Jacques Jean-Alain Fournier, Jean-Baptiste Rigaud, et al.. Design and characterisation of an AES chip embedding countermeasures. International Journal of Intelligent Engineering Informatics, 2011, pp.00. 〈emse-00624400〉



Consultations de la notice


Téléchargements de fichiers