ATTENTION/WARNING - NE PAS DÉPOSER ICI/DO NOT SUBMIT HERE

Ceci est la version de TEST de DIAL.mem. Veuillez ne pas soumettre votre mémoire sur ce site mais bien à l'URL suivante: 'https://thesis.dial.uclouvain.be'.
This is the TEST version of DIAL.mem. Please use the following URL to submit your master thesis: 'https://thesis.dial.uclouvain.be'.
 

Hardware-Trojans : attacks implementations against (un)-protected block cipher designs

(2018)

Files

Momin_39201300_2018.pdf
  • Open access
  • Adobe PDF
  • 1.37 MB

Details

Supervisors
Faculty
Degree label
Abstract
Thanks to Snowden revelations, a societal awareness about security issues has emerged simulta- neously with the exponential number of connected electronic devices (i.e. IoT). This need for security is generally answered by designers based on well known mathematical descriptions of cryptographic algorithms. However, their practical hardware implementations may be exposed to security failures considering physical attacks. As an example, due to the globalization of ICs devices design, the threat of untrusted manufacturers involved in the fabrication process has emerged. This ultimate physical attack is known as hardware Trojan and can expose ICs to huge security failures. In this work, the practical of hardware Trojan exploiting side-channel/physical behavior of electronic devices is explored. First, it presents in details a parametric Trojan implementation based on timing violation and inducing faults in a pipelined AES block cipher architecture. Based on it, it describes secret key recovery methods using classical differential fault analysis and discuss the trade off encountered using the proposed strategy. Second, it presents in details a side-channel Trojan implementation, targeting protected AES and MOE block cipher implementation using the Trojan resilient framework proposed at CCS 2016 by Dziembowski et. al. Again, a key recovery strategy is described and discussions about the different trade off encountered and potential ameliorations are provided.