Cryptology ePrint Archive: Report 2014/884

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack

Pei Luo and Yunsi Fei

Abstract: Clock glitch based Differential Fault Analysis (DFA) attack is a serious threat to cryptographic devices. Previous error detection schemes for cryptographic devices target improving the circuit reliability and cannot resist such DFA attacks. In this paper, we propose a novel faulty clock detection method which can be easily implemented either in FPGAs or integrated circuits to detect the glitches in system clock. Results show that the proposed method can detect glitches efficiently while needs very few system resource. It is also highly reconfigurable to tolerant clock inherent jitters, and will not involve complex design work for different processing technologies.

Category / Keywords: applications / Clock glitch detection, AES, differential fault analysis, side-channel attacks

Date: received 25 Oct 2014, withdrawn 30 Oct 2014

Contact author: silenceluo at gmail com

Available format(s): (-- withdrawn --)

Note: 884 and 883 are the same

Version: 20141030:135036 (All versions of this report)

Short URL: ia.cr/2014/884

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]