Paper 2016/967

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack

Pei Luo and Yunsi Fei

Abstract

Clock glitch based Differential Fault Analysis (DFA) attack is a serious threat to cryptographic devices. Previous error detection schemes for cryptographic devices target improving the circuit reliability and cannot resist such DFA attacks. In this paper, we propose a novel faulty clock detection method which can be easily implemented either in FPGAs or integrated circuits to detect the glitches in system clock. Results show that the proposed method can detect glitches efficiently while needs very few system resource. It is also highly reconfigurable to tolerant clock inherent jitters, and will not involve complex design work for different processing technologies.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Contact author(s)
silenceluo @ gmail com
History
2016-10-10: received
Short URL
https://ia.cr/2016/967
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/967,
      author = {Pei Luo and Yunsi Fei},
      title = {Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack},
      howpublished = {Cryptology ePrint Archive, Paper 2016/967},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/967}},
      url = {https://eprint.iacr.org/2016/967}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.