Cryptology ePrint Archive: Report 2014/884
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack
Pei Luo and Yunsi Fei
Abstract: Clock glitch based Differential Fault Analysis (DFA) attack is a serious threat to cryptographic devices. Previous error detection schemes for cryptographic devices target improving the circuit reliability and cannot resist such DFA attacks. In this paper, we propose a novel faulty clock detection method which can be easily implemented either in FPGAs or integrated circuits to detect the glitches in system clock. Results show that the proposed method can detect glitches efficiently while needs very few system resource. It is also highly reconfigurable to tolerant clock inherent jitters, and will not involve complex design work for different processing technologies.
Category / Keywords: applications / Clock glitch detection, AES, differential fault analysis, side-channel attacks
Date: received 25 Oct 2014, withdrawn 30 Oct 2014
Contact author: silenceluo at gmail com
Available format(s): (-- withdrawn --)
Note: 884 and 883 are the same
Version: 20141030:135036 (All versions of this report)
Short URL: ia.cr/2014/884
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]