ali8
Member level 2
- Joined
- Jan 1, 2011
- Messages
- 49
- Helped
- 0
- Reputation
- 0
- Reaction score
- 0
- Trophy points
- 1,286
- Activity points
- 1,646
Hi,
In Differential Power Analysis, the attacker send lots of plaintext (bits) to the FPGA, which will decrypt them accordingly, and meanwhile the attacker will be measuring the power traces, trying to get the cryptography algorithm key (using statistical techniques and knowledge of the CMOS power model).
Now, if we can limit the number of bits that can enter to the FPGA to those equivalent to the size of the bitstream (stored on an external memory chip), then we can almost overcome the DPA attack, since it is known that DPA attack require large number of measurements (on the order of thousands) to obtain a good correlation...
I am thinking of using something like the Xilinx Zynq SoC, which has a standalone microprocessor, which will read, say, only 20 thousands bits from the external memory (the size of the bitsream) and then disable the decryption process.
In case the design is being used by an attacker, he or she will be able to do a limited number of measurements on the FPGA, after which the microprocessor will disable further decryption.
Is this feasible? Does it make sense at all?
In Differential Power Analysis, the attacker send lots of plaintext (bits) to the FPGA, which will decrypt them accordingly, and meanwhile the attacker will be measuring the power traces, trying to get the cryptography algorithm key (using statistical techniques and knowledge of the CMOS power model).
Now, if we can limit the number of bits that can enter to the FPGA to those equivalent to the size of the bitstream (stored on an external memory chip), then we can almost overcome the DPA attack, since it is known that DPA attack require large number of measurements (on the order of thousands) to obtain a good correlation...
I am thinking of using something like the Xilinx Zynq SoC, which has a standalone microprocessor, which will read, say, only 20 thousands bits from the external memory (the size of the bitsream) and then disable the decryption process.
In case the design is being used by an attacker, he or she will be able to do a limited number of measurements on the FPGA, after which the microprocessor will disable further decryption.
Is this feasible? Does it make sense at all?
Last edited: